--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-03-18T16:40:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T16:40:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"40ce7ef5-f960-49a1-aae2-a3c6d2b0be1b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:40:08Z" name: builder-dockercfg-glwf8 namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 40ce7ef5-f960-49a1-aae2-a3c6d2b0be1b resourceVersion: "3407" uid: 2ba85862-e21b-4bea-85ff-0e556edfc982 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/cluster-version-operator with hostname cluster-version-operator.openshift-cluster-version.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: cluster-version-operator-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-03-17T16:44:15Z" service.beta.openshift.io/expiry: "2028-03-17T16:44:15Z" service.beta.openshift.io/originating-service-name: cluster-version-operator service.beta.openshift.io/originating-service-uid: 5ac0a6bb-7be2-4058-a49e-0f54cc909920 creationTimestamp: "2026-03-18T16:44:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"5ac0a6bb-7be2-4058-a49e-0f54cc909920"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-03-18T16:44:15Z" name: cluster-version-operator-serving-cert namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: Service name: cluster-version-operator uid: 5ac0a6bb-7be2-4058-a49e-0f54cc909920 resourceVersion: "7190" uid: 42af70f1-ce33-44ee-a79e-69104c6e7d5b type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-03-18T16:40:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b1c9422d-28e3-4ac0-b565-2eb5ffc6a497"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:40:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T16:40:04Z" name: default-dockercfg-xx2x2 namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: b1c9422d-28e3-4ac0-b565-2eb5ffc6a497 resourceVersion: "2644" uid: 24994263-0ba8-4f55-8235-c5d10ebfe6ec type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgzMSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-03-18T16:40:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T16:40:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"56028186-8224-409f-b657-753c2fd469ee"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:40:08Z" name: deployer-dockercfg-rpwnn namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 56028186-8224-409f-b657-753c2fd469ee resourceVersion: "3412" uid: 69fb17cf-7a97-4ba8-a3b2-e142537b581f type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21633"