--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-23T17:50:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T17:50:41Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e5d184ad-cfb8-40c1-831c-3e403b40c3be"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:50:41Z" name: builder-dockercfg-qdvwl namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: e5d184ad-cfb8-40c1-831c-3e403b40c3be resourceVersion: "3852" uid: c788c6c8-51c0-4517-89de-314b753554e5 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/cluster-version-operator with hostname cluster-version-operator.openshift-cluster-version.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: cluster-version-operator-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-22T17:56:03Z" service.beta.openshift.io/expiry: "2028-04-22T17:56:03Z" service.beta.openshift.io/originating-service-name: cluster-version-operator service.beta.openshift.io/originating-service-uid: e6f22901-89ac-48dd-85d6-a937ee8a5ea1 creationTimestamp: "2026-04-23T17:56:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"e6f22901-89ac-48dd-85d6-a937ee8a5ea1"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-23T17:56:03Z" name: cluster-version-operator-serving-cert namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: Service name: cluster-version-operator uid: e6f22901-89ac-48dd-85d6-a937ee8a5ea1 resourceVersion: "7677" uid: 9ea1c4f7-f548-40f2-8908-71895f1e5873 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-23T17:50:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T17:50:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bf937538-8759-484f-9f83-fc83802543be"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:50:36Z" name: default-dockercfg-wtb2w namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: bf937538-8759-484f-9f83-fc83802543be resourceVersion: "3355" uid: c31f10c5-12ca-48d8-8b4e-d793a4ee2399 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgyOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-23T17:50:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T17:50:41Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"766867dc-5b6b-462d-8934-b9b7fd2d08dd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:50:41Z" name: deployer-dockercfg-wx7r7 namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 766867dc-5b6b-462d-8934-b9b7fd2d08dd resourceVersion: "3849" uid: 1b273fac-3d15-49a1-9c57-8e4f41755a53 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "20940"