--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T11:12:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5700f766-8dd8-4b44-8c1b-49af94d26e30"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:12:21Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:12:22Z" name: builder-dockercfg-ddfhw namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 5700f766-8dd8-4b44-8c1b-49af94d26e30 resourceVersion: "3656" uid: d905fd61-15cc-4b55-8a7f-8a67246d9fd7 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/cluster-version-operator with hostname cluster-version-operator.openshift-cluster-version.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: cluster-version-operator-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T11:16:26Z" service.beta.openshift.io/expiry: "2028-04-16T11:16:26Z" service.beta.openshift.io/originating-service-name: cluster-version-operator service.beta.openshift.io/originating-service-uid: ab195349-6423-4bf7-85c7-129b3eb469a2 creationTimestamp: "2026-04-17T11:16:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"ab195349-6423-4bf7-85c7-129b3eb469a2"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T11:16:27Z" name: cluster-version-operator-serving-cert namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: Service name: cluster-version-operator uid: ab195349-6423-4bf7-85c7-129b3eb469a2 resourceVersion: "6768" uid: c3da1ab3-642c-4233-8b83-c169c80241dd type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T11:12:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:12:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"67945d2c-8c58-4816-930b-ce12e0bbbb59"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:12:18Z" name: default-dockercfg-xpwxg namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 67945d2c-8c58-4816-930b-ce12e0bbbb59 resourceVersion: "3115" uid: ccf33cfa-1cf1-4167-aa2f-189fe1bf883a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgyOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T11:12:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:12:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"32e6a30e-79cd-40a0-97ec-c2f18e04f8c2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:12:22Z" name: deployer-dockercfg-777js namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 32e6a30e-79cd-40a0-97ec-c2f18e04f8c2 resourceVersion: "3659" uid: c0001855-ba06-4cb7-98d9-e119877a48ac type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "13570"