--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T17:21:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:21:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"462c2da8-0f52-4d4e-85d8-9983c42e62db"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:21:32Z" name: builder-dockercfg-dmjwf namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 462c2da8-0f52-4d4e-85d8-9983c42e62db resourceVersion: "3456" uid: f4f755f4-b0ac-415a-b971-4d5cd6321a9e type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/cluster-version-operator with hostname cluster-version-operator.openshift-cluster-version.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: cluster-version-operator-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T17:27:20Z" service.beta.openshift.io/expiry: "2028-04-16T17:27:20Z" service.beta.openshift.io/originating-service-name: cluster-version-operator service.beta.openshift.io/originating-service-uid: e55eb37a-c6a1-44fe-8c35-982508522d62 creationTimestamp: "2026-04-17T17:27:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"e55eb37a-c6a1-44fe-8c35-982508522d62"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T17:27:21Z" name: cluster-version-operator-serving-cert namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: Service name: cluster-version-operator uid: e55eb37a-c6a1-44fe-8c35-982508522d62 resourceVersion: "7751" uid: 9b38e9de-6c83-43b8-bac6-e5115caf8d50 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T17:21:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:21:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"581bedd7-81bb-43b7-95bd-c143e0f007c7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:21:27Z" name: default-dockercfg-65nv4 namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 581bedd7-81bb-43b7-95bd-c143e0f007c7 resourceVersion: "2920" uid: 870ac1eb-8335-4975-b0c2-046721c42b3c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgzMCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T17:21:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:21:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"dc769f67-abf0-4d46-b331-0a03d7be08c1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:21:32Z" name: deployer-dockercfg-rr2vx namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: dc769f67-abf0-4d46-b331-0a03d7be08c1 resourceVersion: "3455" uid: 49629950-4985-42ce-ba91-f1830b3c3360 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21504"