--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T19:03:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3e87907f-eb7a-46e9-979f-8ab88ffa3e88"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T19:03:53Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T19:03:54Z" name: builder-dockercfg-kftvs namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 3e87907f-eb7a-46e9-979f-8ab88ffa3e88 resourceVersion: "3418" uid: e6b6629f-908f-4468-b7b2-6661b3f25342 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/cluster-version-operator with hostname cluster-version-operator.openshift-cluster-version.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: cluster-version-operator-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T19:07:30Z" service.beta.openshift.io/expiry: "2028-04-23T19:07:30Z" service.beta.openshift.io/originating-service-name: cluster-version-operator service.beta.openshift.io/originating-service-uid: 6281deef-eec1-45d8-8fbb-4f556340bf81 creationTimestamp: "2026-04-24T19:07:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"6281deef-eec1-45d8-8fbb-4f556340bf81"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T19:07:31Z" name: cluster-version-operator-serving-cert namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: Service name: cluster-version-operator uid: 6281deef-eec1-45d8-8fbb-4f556340bf81 resourceVersion: "7180" uid: e571e53b-e5ef-4fd0-836f-25c8b569378d type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T19:03:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T19:03:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1451aab3-ae6c-42ec-beb7-4b98d107bf5c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T19:03:49Z" name: default-dockercfg-xgtd2 namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 1451aab3-ae6c-42ec-beb7-4b98d107bf5c resourceVersion: "2873" uid: 088ab099-369d-4562-bce0-3765e1bd28c4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgzMCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T19:03:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8e5db986-a6e2-4a44-913c-769d4c74ddb0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T19:03:53Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T19:03:54Z" name: deployer-dockercfg-r48cj namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 8e5db986-a6e2-4a44-913c-769d4c74ddb0 resourceVersion: "3419" uid: 399c7f27-f237-4f7c-9dc1-696d3abdde72 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "20814"