--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-02-17T12:43:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"70aa1bab-6f76-43b6-8c4f-6a8e2eb59081"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-02-17T12:43:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-02-17T12:43:10Z" name: builder-dockercfg-ghf2n namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 70aa1bab-6f76-43b6-8c4f-6a8e2eb59081 resourceVersion: "3925" uid: abdc3d52-0106-48ca-85a3-231b2001648e type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/cluster-version-operator with hostname cluster-version-operator.openshift-cluster-version.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: cluster-version-operator-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-02-17T12:49:01Z" service.beta.openshift.io/expiry: "2028-02-17T12:49:01Z" service.beta.openshift.io/originating-service-name: cluster-version-operator service.beta.openshift.io/originating-service-uid: 7645260c-312c-4c37-99c2-00d2415dc3c2 creationTimestamp: "2026-02-17T12:49:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"7645260c-312c-4c37-99c2-00d2415dc3c2"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-02-17T12:49:01Z" name: cluster-version-operator-serving-cert namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: Service name: cluster-version-operator uid: 7645260c-312c-4c37-99c2-00d2415dc3c2 resourceVersion: "7905" uid: d9706a6b-fab3-4d73-9f0d-efb0bc700cb7 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-02-17T12:43:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-02-17T12:43:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"33b4841e-8030-48ea-8aaa-dfa8205b564a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-02-17T12:43:04Z" name: default-dockercfg-w5t2x namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 33b4841e-8030-48ea-8aaa-dfa8205b564a resourceVersion: "3369" uid: bf559d9b-8a9b-4683-96d1-20de6e4a844f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgzMCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-02-17T12:43:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1ba8e832-f329-4ce4-ab30-711c4b647a5b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-02-17T12:43:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-02-17T12:43:10Z" name: deployer-dockercfg-q9jcr namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 1ba8e832-f329-4ce4-ab30-711c4b647a5b resourceVersion: "3931" uid: 19c487fa-a4ab-452f-a59f-e5263405fd96 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "18803"