--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T17:20:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0dd3e177-985a-4a87-b10f-108d002b3fd3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:20:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:56:29Z" name: builder-dockercfg-c46ps namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 0dd3e177-985a-4a87-b10f-108d002b3fd3 resourceVersion: "26301" uid: 5ec6b4e0-85ec-41db-a066-c850f85c85e7 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/cluster-version-operator with hostname cluster-version-operator.openshift-cluster-version.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: cluster-version-operator-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T17:26:03Z" service.beta.openshift.io/expiry: "2028-04-16T17:26:03Z" service.beta.openshift.io/originating-service-name: cluster-version-operator service.beta.openshift.io/originating-service-uid: 00c4bb2e-575d-4e92-8f78-2390a65ef856 creationTimestamp: "2026-04-17T17:26:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"00c4bb2e-575d-4e92-8f78-2390a65ef856"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T17:26:04Z" name: cluster-version-operator-serving-cert namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: Service name: cluster-version-operator uid: 00c4bb2e-575d-4e92-8f78-2390a65ef856 resourceVersion: "7656" uid: 7e96daa3-49f3-4e86-a0e1-cb3512d4ad4d type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T17:20:24Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"82ecd94c-2a77-4a05-a72e-c3489485cef8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:20:24Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:56:24Z" name: default-dockercfg-nkzqj namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 82ecd94c-2a77-4a05-a72e-c3489485cef8 resourceVersion: "26129" uid: 0bb3be1f-5250-4f4c-85b4-f308585c381b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgzMCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T17:20:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f3b2a551-5ba8-47ec-910a-f908460c714e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:20:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:56:29Z" name: deployer-dockercfg-k65sd namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: f3b2a551-5ba8-47ec-910a-f908460c714e resourceVersion: "26303" uid: b813648b-21c2-483f-a91a-3e66bf025185 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "33224"