--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T11:12:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bd2e168f-a2cc-41fc-a027-3dfe2380db0a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:12:38Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:12:39Z" name: builder-dockercfg-pwx7b namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: bd2e168f-a2cc-41fc-a027-3dfe2380db0a resourceVersion: "3369" uid: aa2098ec-a7f5-40bf-8783-30e637ea7a8c type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/cluster-version-operator with hostname cluster-version-operator.openshift-cluster-version.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: cluster-version-operator-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T11:18:29Z" service.beta.openshift.io/expiry: "2028-04-16T11:18:29Z" service.beta.openshift.io/originating-service-name: cluster-version-operator service.beta.openshift.io/originating-service-uid: 82ef2bfe-e56a-4cdd-bb53-3e345124b760 creationTimestamp: "2026-04-17T11:18:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"82ef2bfe-e56a-4cdd-bb53-3e345124b760"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T11:18:30Z" name: cluster-version-operator-serving-cert namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: Service name: cluster-version-operator uid: 82ef2bfe-e56a-4cdd-bb53-3e345124b760 resourceVersion: "7747" uid: bed007bb-add3-4ef3-8ca5-ac38e8d72d2a type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T11:12:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:12:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"50bcce48-2807-429e-b280-5593f3d9be75"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:12:34Z" name: default-dockercfg-k2d87 namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 50bcce48-2807-429e-b280-5593f3d9be75 resourceVersion: "2843" uid: dbf27c03-7868-4654-9a84-a917e414cdfd type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgzMSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T11:12:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:12:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f9a1b445-15e4-400a-b1a3-3e62f7c819cd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:12:39Z" name: deployer-dockercfg-phx6c namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: f9a1b445-15e4-400a-b1a3-3e62f7c819cd resourceVersion: "3388" uid: 77f44300-23ba-4965-bf5d-ce8a5fe568e9 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21744"