--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T18:43:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:43:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"74f76146-35aa-4e49-9c68-c1ebc631fab1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:03Z" name: builder-dockercfg-mxkcb namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 74f76146-35aa-4e49-9c68-c1ebc631fab1 resourceVersion: "3884" uid: 3c5486f0-66a1-4a78-82de-c6758e61803b type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/cluster-version-operator with hostname cluster-version-operator.openshift-cluster-version.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: cluster-version-operator-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T18:49:01Z" service.beta.openshift.io/expiry: "2028-04-21T18:49:01Z" service.beta.openshift.io/originating-service-name: cluster-version-operator service.beta.openshift.io/originating-service-uid: 60fcaaff-9079-4ca6-ab11-82cee166d778 creationTimestamp: "2026-04-22T18:49:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"60fcaaff-9079-4ca6-ab11-82cee166d778"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T18:49:02Z" name: cluster-version-operator-serving-cert namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: Service name: cluster-version-operator uid: 60fcaaff-9079-4ca6-ab11-82cee166d778 resourceVersion: "7863" uid: 5dc1b7c0-bd67-45d7-b91f-3fad2f425a85 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T18:42:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:42:58Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c0815b87-183c-4927-b571-a8dd4c58abf0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:42:58Z" name: default-dockercfg-8mljk namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: c0815b87-183c-4927-b571-a8dd4c58abf0 resourceVersion: "3282" uid: 9bfe792f-431e-4dce-9836-3b8aea69994f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgyOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T18:43:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:43:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f094495e-c981-4bed-bdf9-bdc1cbb2f4ed"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:03Z" name: deployer-dockercfg-9mkvz namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: f094495e-c981-4bed-bdf9-bdc1cbb2f4ed resourceVersion: "3888" uid: 9b14f597-519b-44d9-b280-2ad79e23a237 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "37143"