--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T21:26:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:26:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fe0f58e3-df28-494b-a4fb-43fa9dd62c40"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:26:27Z" name: builder-dockercfg-whtz6 namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: fe0f58e3-df28-494b-a4fb-43fa9dd62c40 resourceVersion: "4175" uid: 01d6aa97-6a08-4154-83be-a7cc86082a99 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVORENDQXh5Z0F3SUJBZ0lJVzBGVDByUmwvNDR3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM056QTJOakkzT0RBZQpGdzB5TmpBME1qUXlNVE14TWpGYUZ3MHlPREEwTWpNeU1UTXhNakphTUVFeFB6QTlCZ05WQkFNVE5tTnNkWE4wClpYSXRkbVZ5YzJsdmJpMXZjR1Z5WVhSdmNpNXZjR1Z1YzJocFpuUXRZMngxYzNSbGNpMTJaWEp6YVc5dUxuTjIKWXpDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVBBRENDQVFvQ2dnRUJBS3cwYnVMTEhIQlNuWXpSM3dsMwp6SzcycVhvNFJ6RlpENHJiY3NtZlFJbHJCbnpUc2t4VWR1czlPNTlWbFBJRkJJNU1YdzRjOFRpU0NiRUpNSnY0Clhzb09JbzVWc2Zya0Z2bldYQlk4STJmU1VXRG5QY3l5MGNPVHh0U0p2NVlxSCs0MkxVOEd2RGFxZTVoOUFnZjYKT1R6eW1ZaHlSQnQxSFBQc1VoTGw5VGlsOFl4dFVxS1BLY0JDMkh3SlpKTVE4cnJXM2N3bDRsUHRBRTBFNE5tNQowUE8yYVY4UUMzUm1FNE10cWMxeER2TENLNjlLbjB4K2JiQ3NaR2YwVHJMZUE2RWhsZUgvb0dTTHd0VGp6TkhiClYrSEtFaFZ1L1lqMGw3VjMzWkVXeU9uaUtZdThhd0MxOTBYVWJEenFWOU4yUk5SdkRRS0F4bWJSdHRJOTZTZW0KTE8wQ0F3RUFBYU9DQVRrd2dnRTFNQTRHQTFVZER3RUIvd1FFQXdJRm9EQVRCZ05WSFNVRUREQUtCZ2dyQmdFRgpCUWNEQVRBTUJnTlZIUk1CQWY4RUFqQUFNQjBHQTFVZERnUVdCQlNRZ1E3R21lblNQMGNHb054a0gyK0djd2RnCkxEQWZCZ05WSFNNRUdEQVdnQlRCWkl6RzJnNTIxdWwxMDMzZ3MwbXFHcTB6eHpDQmlBWURWUjBSQklHQU1INkMKTm1Oc2RYTjBaWEl0ZG1WeWMybHZiaTF2Y0dWeVlYUnZjaTV2Y0dWdWMyaHBablF0WTJ4MWMzUmxjaTEyWlhKegphVzl1TG5OMlk0SkVZMngxYzNSbGNpMTJaWEp6YVc5dUxXOXdaWEpoZEc5eUxtOXdaVzV6YUdsbWRDMWpiSFZ6CmRHVnlMWFpsY25OcGIyNHVjM1pqTG1Oc2RYTjBaWEl1Ykc5allXd3dOUVlMS3dZQkJBR1NDQkZrQWdFRUpoTWsKTjJJMk16VmlPV1F0WkRVNE1TMDBObVl4TFRsak1HUXROR00xWW1VMU5HWTFPVFpoTUEwR0NTcUdTSWIzRFFFQgpDd1VBQTRJQkFRQkpLc0Jyckl4SXZrbS9mZ1BaT21ialR1SmNoSHcrUEN1c3huanM1Tm9uNWFrR1hXUU54dzBZCk8rVEE3bG15R0JIRUpjcmUwSUZ0Um1kK25tQ2RoNnBzVUpRTk9ZdHJYMThKWnErbzQzVUlBMWs2MXBPNWpIVnoKYUlpeVdDR2VvY0xVM3JxaDExYkRzNkVpWE9ZUDNyQlowTWl3c2lITkU2OWgvQit4RksrWGxDUUR6UWd6S2VwcQozajJvdFo3L3pTaFFWb1VZL05tQ3FoUkFXSFZueHdvOEdUb2YzVHR2aHR4Y3ZTRlAwVVYxM0d6SjR3TVFKVmdZCk5YR0RNWmZsS3NnQVRzMW11RHZJZ2Jyb1cyN2VSNmVTYmZDZXU1ZE5aMGVuUWZmWUMyamV0c2g3ZzZkb2xUUEoKRHd5S3QyZFJVZXZWQURQd1JaQ0YrY3RQb2dQYVZzTmEKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlEUFBvTnYzOUZwc3dEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTnpBMk5qSTNPREFlCkZ3MHlOakEwTWpReU1UTXhNVGhhRncweU9EQTJNakl5TVRNeE1UbGFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056Y3dOall5Tnpnd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFEREZpRGhueDNHZHhTeTg0akw4WURUdENVa2dZbDJqZ2g1CmZqMUNCdGFzYXkvR3c4OHBuR1VBTXdMb0tzVndPMyt3Wm9aWUhKalI1OE9GckhaUW5YRVVIWlh4WVArWVIrSlIKOUJuTElVZElaNlFqc3lpaVBrMmNBMFpyWFN5aWRZWUY5SmIxV1dldzZoMTFBOFZBL1dHNGNmV1A5MHc1OENvMQorV1RneUt1RllnR1Q1Vy8yNzFQeExZWGd1SFJ4RGNTQVBhemU4akJuTktORlJwSkVpWklKRjE2VHRMa0t5TW9aCmRtNkdOYnp2T1dHSnZ0RnVuTXI2TmZnSTRrUnNaWE9NSXF5WnJ3UTNFV3NBekxmbWUxcTM4ekFHNXE1aldjRjYKZi9qWiswOGlzZ25IN2FvaWFXb1dFT2R2RkJZZnpCSGlHbkk4c0dBRVlnaCtHelE2NlY0dEFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCVEJaSXpHCjJnNTIxdWwxMDMzZ3MwbXFHcTB6eHpBZkJnTlZIU01FR0RBV2dCVEJaSXpHMmc1MjF1bDEwMzNnczBtcUdxMHoKeHpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVgyZ2krU0dleVpyek5adlk5Ny9BQkV6YVNFL3Zyd1ZXZElOZQo4bG5jOEs3V2FMWnhXU2F6QU9aVmk0bzJINEk1REFTeXJNMnRYUFJPQzB5Z3lZL0Y1M2Q0ckpReFc4dWFnR2dCCi8ySEl5SjZRa2NkN3dJbTEyRkR6anhNWFFSYVhTR3NSM2pnOGhpYkxnTi9vK1E5YVdOb21BY1pIOVRhM1k5bEkKRkptQ0M3R2ptWTFvcWNMd0dSRThINGpUbWcvMVZHZzM2R1ViVmgvR3hWRndQemxqdGRjNlB4alNtZEZQTHc0UgphNmozbW9SVU4vdVl4SjBmNy9WcWc5ZDYyMFI2ZzdiWlgzVmZRVHZkd1dGTkZwcEoyejZXcS9MaG5XRklTaGt3CmcyN0F0R0ZHMUtPMktiSHZxUldTa1ZmUnYvTXFDSjlqdUpzUjJ4cG1ZblJpQTNsZmNBPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/cluster-version-operator with hostname cluster-version-operator.openshift-cluster-version.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: cluster-version-operator-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T21:31:22Z" service.beta.openshift.io/expiry: "2028-04-23T21:31:22Z" service.beta.openshift.io/originating-service-name: cluster-version-operator service.beta.openshift.io/originating-service-uid: 7b635b9d-d581-46f1-9c0d-4c5be54f596a creationTimestamp: "2026-04-24T21:31:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"7b635b9d-d581-46f1-9c0d-4c5be54f596a"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T21:31:23Z" name: cluster-version-operator-serving-cert namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: Service name: cluster-version-operator uid: 7b635b9d-d581-46f1-9c0d-4c5be54f596a resourceVersion: "7680" uid: fa0095cb-1e96-4cdf-846e-54c8c1a7f969 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T21:26:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:26:21Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"409de47b-445a-4e5a-b837-a629c9a80ac7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:26:21Z" name: default-dockercfg-ftzmp namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 409de47b-445a-4e5a-b837-a629c9a80ac7 resourceVersion: "3610" uid: 95795260-baea-44fc-95e9-1c4a370086b4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgzMSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T21:26:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:26:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"deedc145-cbfb-4be6-b313-a3cb02dbbf2c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:26:27Z" name: deployer-dockercfg-8ql2x namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: deedc145-cbfb-4be6-b313-a3cb02dbbf2c resourceVersion: "4173" uid: 43892421-086d-4a45-8f1d-cf618cb19aa5 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21374"