--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T18:46:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:46:38Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"443150fc-7af4-44b0-92a2-5eee1e1e16fa"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:46:38Z" name: builder-dockercfg-gwzjt namespace: openshift-service-ca ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 443150fc-7af4-44b0-92a2-5eee1e1e16fa resourceVersion: "6735" uid: 3892826d-28a9-4f32-ae45-d1b64ad8d746 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T18:46:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:46:38Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"036e5c27-4da7-4cac-abe7-b789c33a46fd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:46:38Z" name: default-dockercfg-kkjgf namespace: openshift-service-ca ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 036e5c27-4da7-4cac-abe7-b789c33a46fd resourceVersion: "6733" uid: 43989384-8cfd-44c3-81d8-91d2b82a347c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc3MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T18:46:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:46:38Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f08156a5-9c6f-4953-8ab7-a056c02daa7c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:46:38Z" name: deployer-dockercfg-kt4mk namespace: openshift-service-ca ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: f08156a5-9c6f-4953-8ab7-a056c02daa7c resourceVersion: "6736" uid: c1e33550-a520-4268-b42f-4fea1cd6ef8a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: service-ca creationTimestamp: "2026-04-22T18:46:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:46:38Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0f481d44-1fa0-4568-aceb-cdadf7cf4022"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:46:38Z" name: service-ca-dockercfg-pzwbg namespace: openshift-service-ca ownerReferences: - apiVersion: v1 kind: ServiceAccount name: service-ca uid: 0f481d44-1fa0-4568-aceb-cdadf7cf4022 resourceVersion: "6787" uid: 2f8ed2e8-e145-49fa-9d69-928eba909d54 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: Service CA secret contains a signing key that will be used to issue a signed serving certificate/key pair to services annotated with 'service.beta.openshift.io/serving-cert-secret-name' openshift.io/owning-component: service-ca creationTimestamp: "2026-04-22T18:46:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T18:46:39Z" name: signing-key namespace: openshift-service-ca resourceVersion: "6802" uid: f8ef7411-dcb0-469d-a30c-ca59d5a1f1ac type: kubernetes.io/tls kind: SecretList metadata: resourceVersion: "20979"