--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-21T10:00:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cd4b697f-4f10-4c06-9f7c-16bd7a9f2a76"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T10:00:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T10:36:07Z" name: builder-dockercfg-m84zv namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: cd4b697f-4f10-4c06-9f7c-16bd7a9f2a76 resourceVersion: "26284" uid: fb613e1c-e089-4429-9a9b-94587344d9b2 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/cluster-version-operator with hostname cluster-version-operator.openshift-cluster-version.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: cluster-version-operator-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T10:04:23Z" service.beta.openshift.io/expiry: "2028-04-20T10:04:23Z" service.beta.openshift.io/originating-service-name: cluster-version-operator service.beta.openshift.io/originating-service-uid: bdef8fc2-8efc-4ae3-9494-5d3edc92a38f creationTimestamp: "2026-04-21T10:04:24Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"bdef8fc2-8efc-4ae3-9494-5d3edc92a38f"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T10:04:24Z" name: cluster-version-operator-serving-cert namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: Service name: cluster-version-operator uid: bdef8fc2-8efc-4ae3-9494-5d3edc92a38f resourceVersion: "7116" uid: dfde2a05-e35f-4392-be38-cd66d582e8ec type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-21T10:00:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e7c1d1db-ad2f-42c7-a025-e5b90056355b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T10:00:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T10:36:03Z" name: default-dockercfg-nn2q4 namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: e7c1d1db-ad2f-42c7-a025-e5b90056355b resourceVersion: "26143" uid: 51274df2-f041-4f11-ae3c-a4cac4ae3b90 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgyOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-21T10:00:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8f10e249-c040-4808-aa83-8afd3020dcae"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T10:00:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T10:36:07Z" name: deployer-dockercfg-qbtp9 namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 8f10e249-c040-4808-aa83-8afd3020dcae resourceVersion: "26287" uid: cd1b1d38-11a8-44ab-bfdc-7dc0aea37fe3 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "32967"