--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T18:43:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:43:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3a222f45-d0ed-4316-b3c1-beed67c45ca2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:15Z" name: builder-dockercfg-vj4wf namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 3a222f45-d0ed-4316-b3c1-beed67c45ca2 resourceVersion: "3698" uid: 0312c178-f60a-470a-9e3b-e419ff4acfb0 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/cluster-version-operator with hostname cluster-version-operator.openshift-cluster-version.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: cluster-version-operator-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T18:46:45Z" service.beta.openshift.io/expiry: "2028-04-21T18:46:45Z" service.beta.openshift.io/originating-service-name: cluster-version-operator service.beta.openshift.io/originating-service-uid: 32f2f8c4-4312-4d3d-ab5d-1338963f6964 creationTimestamp: "2026-04-22T18:46:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"32f2f8c4-4312-4d3d-ab5d-1338963f6964"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T18:46:46Z" name: cluster-version-operator-serving-cert namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: Service name: cluster-version-operator uid: 32f2f8c4-4312-4d3d-ab5d-1338963f6964 resourceVersion: "6978" uid: 7519777b-18be-4e22-9aa3-3209daa80d20 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T18:43:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:43:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6f295e8a-84db-4066-8c4a-a86abcc5337d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:10Z" name: default-dockercfg-dvtlj namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 6f295e8a-84db-4066-8c4a-a86abcc5337d resourceVersion: "3104" uid: 8ccca9ef-e120-4aeb-8085-4ae4cf3faa3e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgzMSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T18:43:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:43:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"25e70efe-2da8-4a18-b76f-8a0eefeb3e2e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:15Z" name: deployer-dockercfg-cxvg4 namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 25e70efe-2da8-4a18-b76f-8a0eefeb3e2e resourceVersion: "3697" uid: 883a815c-a323-4055-8c8d-1ca78e916619 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "20732"