--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T13:55:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:55:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f61fb4c8-e0db-467d-88c6-5b541ef57691"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:55:48Z" name: builder-dockercfg-724dk namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: f61fb4c8-e0db-467d-88c6-5b541ef57691 resourceVersion: "4054" uid: b4d887bd-4276-4c7e-8cac-39aba8b88035 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/cluster-version-operator with hostname cluster-version-operator.openshift-cluster-version.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: cluster-version-operator-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T14:01:10Z" service.beta.openshift.io/expiry: "2028-04-15T14:01:10Z" service.beta.openshift.io/originating-service-name: cluster-version-operator service.beta.openshift.io/originating-service-uid: 7c31e42c-c5e3-44f2-ab06-0410fb301360 creationTimestamp: "2026-04-16T14:01:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"7c31e42c-c5e3-44f2-ab06-0410fb301360"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T14:01:10Z" name: cluster-version-operator-serving-cert namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: Service name: cluster-version-operator uid: 7c31e42c-c5e3-44f2-ab06-0410fb301360 resourceVersion: "7745" uid: 30d12459-5c46-4604-917f-73582ed18a85 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T13:55:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"35b6ab94-43f9-44cf-807c-860e0c41b650"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:55:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:55:43Z" name: default-dockercfg-t9rtg namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 35b6ab94-43f9-44cf-807c-860e0c41b650 resourceVersion: "3474" uid: 4cefb4ac-3cfd-451e-b014-d2e435ce3d0d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgzMCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T13:55:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:55:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"93ceaaaa-3fdf-4bd3-8bc7-105fd52b828b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:55:48Z" name: deployer-dockercfg-8whsk namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 93ceaaaa-3fdf-4bd3-8bc7-105fd52b828b resourceVersion: "4053" uid: 3656d33c-4d89-4cc9-88bc-17d963c50cb8 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "20977"