apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
annotations:
kubectl.kubernetes.io/last-applied-configuration: '{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRoleBinding","metadata":{"annotations":{},"creationTimestamp":null,"labels":{"app":"gitpod","component":"ws-daemon"},"name":"gitpod-ws-daemon-rb-kube-rbac-proxy"},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"ClusterRole","name":"gitpod-kube-rbac-proxy"},"subjects":[{"kind":"ServiceAccount","name":"ws-daemon","namespace":"gitpod"}]}
'
creationTimestamp: '2022-09-06T22:34:25Z'
labels:
app: gitpod
component: ws-daemon
managedFields:
- apiVersion: rbac.authorization.k8s.io/v1
fieldsType: FieldsV1
fieldsV1:
f:metadata:
f:annotations:
.: {}
f:kubectl.kubernetes.io/last-applied-configuration: {}
f:labels:
.: {}
f:app: {}
f:component: {}
f:roleRef:
f:apiGroup: {}
f:kind: {}
f:name: {}
f:subjects: {}
manager: kubectl-client-side-apply
operation: Update
time: '2022-09-06T22:34:25Z'
name: gitpod-ws-daemon-rb-kube-rbac-proxy
resourceVersion: '840332723'
uid: 7ca0e761-58db-40d6-91b4-18ab52f60851
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: gitpod-kube-rbac-proxy
subjects:
- kind: ServiceAccount
name: ws-daemon
namespace: gitpod