--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-28T19:13:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c3ef2846-5015-4b4e-8d08-3bd1adedcef9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-28T19:13:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-28T19:49:15Z" name: builder-dockercfg-88nkv namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: c3ef2846-5015-4b4e-8d08-3bd1adedcef9 resourceVersion: "36103" uid: 44d9a63d-a0a3-4857-b2a9-1e8a58fed005 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVORENDQXh5Z0F3SUJBZ0lJVUg1MDI0TzF6Mmd3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM056UXdNemM0T1RBZQpGdzB5TmpBME1qZ3hPVEUyTXpOYUZ3MHlPREEwTWpjeE9URTJNelJhTUVFeFB6QTlCZ05WQkFNVE5tTnNkWE4wClpYSXRkbVZ5YzJsdmJpMXZjR1Z5WVhSdmNpNXZjR1Z1YzJocFpuUXRZMngxYzNSbGNpMTJaWEp6YVc5dUxuTjIKWXpDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVBBRENDQVFvQ2dnRUJBTWJ5M0k3Vk5VQ0hXcXpHTnZsUApaczVhTFJVT3FjeTRhU1ZHWnNJYWVCWE9tREtPU3dRbUZ3Rml2WExOR21rT3MrODlFWkdSc1VDNkNha3Z0bjBCClB4dFlLZFBycWZOZDRraUtNd2huV1luUmlJQ1hrWi91SkNkSkVTUUlKcmVkbFZRaGlvdDlpRkNrUCtLRmw3RjMKSmlKM0lxcnQvMDRNajc2VGt0Q2ZYd095TU5rYlBMZVVSc1BXTG9ObUI2MmdpcUlDdUp3SWM0L1Z2NEErMWpOdgp2SVNQa0xEMnA5K2JBbHhRL3VnWERJck5oUjY3WFJIdFlBUVRDOTBMSXI3NXZQSkp1aXY2a1JTTVliQXJyeGd2CjVoSUFtYXBWMFd3Sjh0WVcrYWM3cWpLSGo5by9RR1d6YXpDN1h2TmdSWmtUT2FJYUxvS0pNU21IMjI5ZC9ZNGsKYm9VQ0F3RUFBYU9DQVRrd2dnRTFNQTRHQTFVZER3RUIvd1FFQXdJRm9EQVRCZ05WSFNVRUREQUtCZ2dyQmdFRgpCUWNEQVRBTUJnTlZIUk1CQWY4RUFqQUFNQjBHQTFVZERnUVdCQlFWRnArRElQb1lreHRiRHRrWllhL2VHL2RBCjB6QWZCZ05WSFNNRUdEQVdnQlJJS1l6N1luWC9JN0h2akdJQ3A1NUVmSjd2YVRDQmlBWURWUjBSQklHQU1INkMKTm1Oc2RYTjBaWEl0ZG1WeWMybHZiaTF2Y0dWeVlYUnZjaTV2Y0dWdWMyaHBablF0WTJ4MWMzUmxjaTEyWlhKegphVzl1TG5OMlk0SkVZMngxYzNSbGNpMTJaWEp6YVc5dUxXOXdaWEpoZEc5eUxtOXdaVzV6YUdsbWRDMWpiSFZ6CmRHVnlMWFpsY25OcGIyNHVjM1pqTG1Oc2RYTjBaWEl1Ykc5allXd3dOUVlMS3dZQkJBR1NDQkZrQWdFRUpoTWsKWVdZNE9HRmxZekF0WVRsbVlTMDBPR1E0TFRoa01qY3RZamxsWW1NeFpETTJOREprTUEwR0NTcUdTSWIzRFFFQgpDd1VBQTRJQkFRQUtLM1NnZmdmazVDWUVPUnlaK0FWRHBCZldsaUMwZVZhMlpkNTZvb01YM0JMVit0cXFoVHRMCnAydlRyUlM5alE4WnFYMWUzRzk2ZTFWYi9KRmdoUmhtbHhpZmo0Mm9zb2J4cmJ3ZndPVGpYckxNY0ovQ254bVUKbENpQkc4ZHZyZTVxNFcvRmtlckFRY2lHaStOVjJRdGo2QUZxcUJYd1NiOVdmaU5rSUpKaWNXb0FhbnNZQjhIYQpORExaSUZVUEZ2ZndQTElFc3VKL0xjN0tUL09FUERyMS9CbUJzSGtIc1BRRXZqZ0R0Z29FSGdoVVpvVmo1RGVuCjNyWEFJUGkwanZBVWFVMDdOR2hFL2RYOWVjbElUUGNjTEsvRDVIM3krMGNLcm5nUWpXb2d2ZnRDZnpkSDZ0SW8KQWZhWXNuazFYcjFCSDVXajkxb0lqYnhqRENERjRRQzgKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlFdnpUSWd3NHNGZ3dEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTnpRd016YzRPVEFlCkZ3MHlOakEwTWpneE9URTJNamxhRncweU9EQTJNall4T1RFMk16QmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056YzBNRE0zT0Rrd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFDNDRCWEp3UG1nN2dyOEZsSWkwVW5TOHJLckRCVlJVS3piCkZVM3JUemh3WjcreGlISURoQjY0OXM2MWF6eWs4NFE2dnoxNWhVRUFhWE1KbTBOdkZJbkhEcTl6UjY1RDVlRUUKNmZwZzhZS1JsdVhIY1E0YXZtMWNLL2lLcmdxNEYrOW4zdzJFQm5MaE41MmRFSkxIVDM0QlZ6L1ZnNEtEMXpyRQpoMmRZUGxzYUdYMDEzUUdqZURXakVNNTVETy9Pc0NhekFwQkZVb0RQdUQwTGtCT0NuUWxxWllNU0trK252UFNNCitzemxrU1l4bnZNWVVBMkhqRTNFZVREQzh5bnhnZTVtRnBRWHh0SXdvM2pGb1RMZ0ZOZ1NpVDFoMjNXdzdvbkEKM1N5QWpzc1Vwc2FIRzloZDR2MnEvVGw3azV6SW9jaXN1bnVtd05mM3VMajFUSk9aek43ckFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUklLWXo3ClluWC9JN0h2akdJQ3A1NUVmSjd2YVRBZkJnTlZIU01FR0RBV2dCUklLWXo3WW5YL0k3SHZqR0lDcDU1RWZKN3YKYVRBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQUF4VDY5bE5RU1BCS2tQUnYwVmdTTjJkMDN0dWQvUHNjTjlXNQovL2lPSU12cUMva3A4NmhqS053Mkt4SjRwOXpmUlJsQ1FSRnFKb1Z2WlpQM3oxQ2dLbnV3MzlqNjNlMDdMNlAxCmtMYXY3T25IazFpeVc2N2dBR1JZT2NZVllNYjIxZXFNNHowSzd4d2tRck4yTTBNbWVYR2ZaNmphMlk4dnBKMjAKWTdrdjM2Mk54emQvL2NPNUJ2N2xVemZ0RXRqMXdlanp6b1lMR0p1M2Q0RnUvUDJETXVnaG5VWUQ0bmEvSUFYbQpFdktNTzFMZTN0TXFobURQdHMzc2lMMXh0ekNZajArWWxkN0RMaHpVY0E5bjBDczhJb25kdUJwOWxHbW1HQXBzCmtWY1M1ZVArZTNmTzQzRkJ3aXJoN0QrUVhrTy9WbFZPcE9FV2sxOXFBMlkzZUlPdW53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/cluster-version-operator with hostname cluster-version-operator.openshift-cluster-version.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: cluster-version-operator-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-27T19:16:34Z" service.beta.openshift.io/expiry: "2028-04-27T19:16:34Z" service.beta.openshift.io/originating-service-name: cluster-version-operator service.beta.openshift.io/originating-service-uid: af88aec0-a9fa-48d8-8d27-b9ebc1d3642d creationTimestamp: "2026-04-28T19:16:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"af88aec0-a9fa-48d8-8d27-b9ebc1d3642d"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-28T19:16:35Z" name: cluster-version-operator-serving-cert namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: Service name: cluster-version-operator uid: af88aec0-a9fa-48d8-8d27-b9ebc1d3642d resourceVersion: "6659" uid: a12f7354-f606-44b5-b3a8-9b9ac94d2db6 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-28T19:13:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"73a6ac2e-27a9-46c9-a0d6-5e09de29f9cd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-28T19:13:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-28T19:49:09Z" name: default-dockercfg-gp9st namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 73a6ac2e-27a9-46c9-a0d6-5e09de29f9cd resourceVersion: "35796" uid: 5e83ebc8-425d-4dff-916d-3f51966dea29 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgyOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-28T19:13:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"86acb15e-172d-45d6-881b-e857731a3392"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-28T19:13:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-28T19:49:15Z" name: deployer-dockercfg-t552w namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 86acb15e-172d-45d6-881b-e857731a3392 resourceVersion: "36112" uid: 8333f5f5-b1f1-4c2d-8ef3-691a27fa0133 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "64016"