--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T19:19:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:41Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9ca69a0a-f2ec-4fd6-857b-fde8f1e2fbda"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:19:41Z" name: builder-dockercfg-hgqm4 namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 9ca69a0a-f2ec-4fd6-857b-fde8f1e2fbda resourceVersion: "3210" uid: 697f1f49-2f52-4461-a1be-60d678da94c6 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVORENDQXh5Z0F3SUJBZ0lJVWNiTVF3MGpDQmd3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qZzROVGt5T0RBZQpGdzB5TmpBME1qSXhPVEkxTXpKYUZ3MHlPREEwTWpFeE9USTFNek5hTUVFeFB6QTlCZ05WQkFNVE5tTnNkWE4wClpYSXRkbVZ5YzJsdmJpMXZjR1Z5WVhSdmNpNXZjR1Z1YzJocFpuUXRZMngxYzNSbGNpMTJaWEp6YVc5dUxuTjIKWXpDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVBBRENDQVFvQ2dnRUJBTnpFNS9STEpMeko0ZEx3M0JuQwpPS0VYeUVOZ1ZpZm9pb0c2aHRsN3E3Nzd1R3hnaXlQc2NBK1hmbFFINVg4NmRyWFNhVDBzdFFTRUtjb0ZER1JQCm5jb3hmODdaTkVxb1JSekg4ME5lZjdFNm51dnh6YzVWb1JKTVFuQTJYNTZkR0FXeGZ5dnFKNGFVb1d3Z1F2YzYKTkxLNVJHZTdWK2ZOSWJWU3Q3WW5FWklrazAzM1JjTXBQZjh2dFB5U1RFZGVMT0ZvakJ5MWg4YVhDQkRra0NINwpoVXV6VTVuWHdaNGludldmaVdTK2NOSmJWK2hiQUhNR3NWbzBGQUswZGp3SXpkVXpZeEV2cTJpeWkwbjFBNWlaCllSQjJyZmt0VEUyZzNDTEJ3REZrejUxSzlLdm91bDgzVUpTNldYamVwemZqbzZLM3hhaERJdCtwc0dQZDhCVjcKN2RzQ0F3RUFBYU9DQVRrd2dnRTFNQTRHQTFVZER3RUIvd1FFQXdJRm9EQVRCZ05WSFNVRUREQUtCZ2dyQmdFRgpCUWNEQVRBTUJnTlZIUk1CQWY4RUFqQUFNQjBHQTFVZERnUVdCQlRqeFJVR2MweU1Ld0g2WVFXRTRmSEJCZUJFCnNEQWZCZ05WSFNNRUdEQVdnQlJlMTE2dDJiaGNXS0tIOU4zN1JTak9LcGVQOGpDQmlBWURWUjBSQklHQU1INkMKTm1Oc2RYTjBaWEl0ZG1WeWMybHZiaTF2Y0dWeVlYUnZjaTV2Y0dWdWMyaHBablF0WTJ4MWMzUmxjaTEyWlhKegphVzl1TG5OMlk0SkVZMngxYzNSbGNpMTJaWEp6YVc5dUxXOXdaWEpoZEc5eUxtOXdaVzV6YUdsbWRDMWpiSFZ6CmRHVnlMWFpsY25OcGIyNHVjM1pqTG1Oc2RYTjBaWEl1Ykc5allXd3dOUVlMS3dZQkJBR1NDQkZrQWdFRUpoTWsKTXpKaVpURTFOMlV0TWpWa05DMDBPR0ZpTFRreU16TXROR0U1TmpJelpUTTJNek5oTUEwR0NTcUdTSWIzRFFFQgpDd1VBQTRJQkFRQnNjNGQyTjREMEJZUXhKK0RZUCs1TGNXN3EvTWVuTWVwbjJiUlNuYzE1YlVLRDJlb3dMd3BHCjhPZGg1MGNMRzhkS2xEdzlMLytHM3QwTU9rdVIxSTVwTnIxV2x5eEhVd3czZXVBSHFjSzQza1BGWnBRODY5cS8KdkREOE5ZanI0d2NlcE5VclhBRVFkTXVSUXh3R0IzTWJaSFV5b3h6L3EvQkIwU3RiTDN1RmlUWEtZWFVDak81WApLdDF5V256NmVHdFFMbjlUUmJMYnJ1TG1uSCs1OVR1N1RmMU8vRkdvRjE0dU9UaGdrekpJTzJDZnBDZS93R0VHCkNka3FuRjBuSlFBaHNMSEVpR3lOY0Z6YUVuWGp2Wk1wUXdHMGlhemNKUEVPUi83WTBNb01DZVB3dFVKbGs1QTEKTjQzTzdKQWpVNklXU0xZTnVEOEFkU1F5UGFydzVJb0UKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlSVGU0UWZXcjkwSXdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpnNE5Ua3lPREFlCkZ3MHlOakEwTWpJeE9USTFNamhhRncweU9EQTJNakF4T1RJMU1qbGFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTRPRFU1TWpnd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFDdVRQTGxseXU0SFpmYUs1TS9lMEdaYURjR3hCajNCbGhNCnE1ZGR4UmNrc2p3NWFsdC9WWlpnKytXK0JleHFndUZvcDJyblRPSWpiQTJQRkJDVTI4VVgvVm5QRUJRWnVNMEcKVmN5dEpYdzc2cEtoQ2NVQktOU1Y2LzNzRTFDbExReDg5TjBaS0JPOTBWREpLOVFOcjdDbm5sT2gvYkhITTdhUgozYWxBekNYaUUyR0UxNHpoUWhhcEw5Z2YySGx5eE5xN29BSzZWV1cyZTNoUkU4dlRWRzluc3lIM1J6WXpaczhRClZaeGRJSWZqdUJSK09BanpDVzg5bDY0TUlqVnVPTWtQYW1vVVhRRnBSK3Y5K0JteDRLd214WWU0NUR6ZGZZNDkKRnRuaGJLT2NJZ2oya1AzeHN3REt4SEdrTUk1eHNZYW11VnE4OEt6c0k0eWFsQW1rQXJwVkFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUmUxMTZ0CjJiaGNXS0tIOU4zN1JTak9LcGVQOGpBZkJnTlZIU01FR0RBV2dCUmUxMTZ0MmJoY1dLS0g5TjM3UlNqT0twZVAKOGpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVh2SWM2TS9ueVo4KzRUUDlJbzIyY09rTFkvWWoxUnZYSmQxeQpHbFF5Z3JsVXh3b0RMUy9UYk5TQ3dVZzlKVVVPRGgxSXNOVmpIdTFjdHVVY1kwYmtkQ0JwZVpsbTFxOHdlYzFWCjZzS2VvTzhjNUR4VHZtU2I5RzZtOTR1VnRzMFhBVk40alhhOWlRM2M4d1BRSVB3Z0I0aWs1VTVLTGZPWDNLOTgKM2x5WDZoQ0VYUGFDVDJDamJZcDhIWkVOek5HQ0NZd1R6YThNZGdFT3N6VUZWeUNNR0k0OEw1dG9zT2tjZDk3SwpNcW1ja1RCanNIZVdJbGQxM0RwOEFlM0xaUG91T25lQnpVY1hKOGRKcm9QblJlTzRVMGhGR1hzL0F4TFpWaDNTCjdGdjBuc2JKK1RocXJvVFhqTElEOW4wZGxhTjBPM0QzVDdOaVV6RW1qaFBmV3FLVDZRPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/cluster-version-operator with hostname cluster-version-operator.openshift-cluster-version.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: cluster-version-operator-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T19:25:33Z" service.beta.openshift.io/expiry: "2028-04-21T19:25:33Z" service.beta.openshift.io/originating-service-name: cluster-version-operator service.beta.openshift.io/originating-service-uid: 32be157e-25d4-48ab-9233-4a9623e3633a creationTimestamp: "2026-04-22T19:25:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"32be157e-25d4-48ab-9233-4a9623e3633a"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T19:25:34Z" name: cluster-version-operator-serving-cert namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: Service name: cluster-version-operator uid: 32be157e-25d4-48ab-9233-4a9623e3633a resourceVersion: "7689" uid: 863903a0-8ab0-427f-a862-173830270abc type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T19:19:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d062b955-b9da-4e54-b9a6-194154a56b39"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:19:37Z" name: default-dockercfg-kc7h5 namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: d062b955-b9da-4e54-b9a6-194154a56b39 resourceVersion: "2659" uid: 38c47de4-a977-489e-a53e-918401360885 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgzMCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T19:19:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:41Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"424a3993-cfe6-41c4-98c3-242efbdd4378"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:19:41Z" name: deployer-dockercfg-8kwdt namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 424a3993-cfe6-41c4-98c3-242efbdd4378 resourceVersion: "3211" uid: e75cf5d5-e7e6-4fd9-ac28-a18cd912cdb5 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21407"