--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T14:11:11Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0d450ec1-4dc4-4c38-a37b-f54c1011cdcf"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:11:11Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:11:48Z" name: builder-dockercfg-bj8w8 namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 0d450ec1-4dc4-4c38-a37b-f54c1011cdcf resourceVersion: "4118" uid: 1f22b39d-acf2-487f-a6d5-90b9de8806bf type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVORENDQXh5Z0F3SUJBZ0lJRjN0aHJvUENBSVF3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qZzJOelEwTWpBZQpGdzB5TmpBME1qSXhOREUzTWpaYUZ3MHlPREEwTWpFeE5ERTNNamRhTUVFeFB6QTlCZ05WQkFNVE5tTnNkWE4wClpYSXRkbVZ5YzJsdmJpMXZjR1Z5WVhSdmNpNXZjR1Z1YzJocFpuUXRZMngxYzNSbGNpMTJaWEp6YVc5dUxuTjIKWXpDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVBBRENDQVFvQ2dnRUJBTGFMTkZsT0tsd3d1dWU1TWtBTQpGL0pnWWdvbjRFeVFOOE1nWmdpdVNJS3M1NTVja0JFQVVBTFd3SFZkNWVOWVpWMGhwVzZ1ZysxK0tQR095ZlltCnIyWnZXV1NlcHRHc0JaWDNKV3NFWWdOQ0UxdldZRVhZdDR1ZkVOM0JHbXVVcTVXeGFWVGpyaWNPeUVpZkViU0cKc3JsM0FzSXJuTjFlMktIYmtFM3RNTGNoeS9YKzVwZnpGOGVBck9DVkJIamR0NGVRKzRMbFkrTjJkY3Q5QkVpbAp4aU5UZkgrQVJLZU5xZTcxZ1FrQzlDVmM5VWxocHh2RkFKNXdpQmR5ajUrQ1RmK1VmbDloemFjeUdtQytqVmVHClpKVUNiSkZZVVF5aVVrN1VEaWd0cEp2Vk5jRDVQc3BPMWI4c2xhRWRlUUlKM1NhMEhnRVlBQmlYNS9lWlNRMmEKYnlFQ0F3RUFBYU9DQVRrd2dnRTFNQTRHQTFVZER3RUIvd1FFQXdJRm9EQVRCZ05WSFNVRUREQUtCZ2dyQmdFRgpCUWNEQVRBTUJnTlZIUk1CQWY4RUFqQUFNQjBHQTFVZERnUVdCQlN4VEFJb2oxcHc0eXErR29wK2ZGT0dYajZjCmhEQWZCZ05WSFNNRUdEQVdnQlIwaXBMa3JFS05YeUdmckd6b3FaaDhTR0ZMRXpDQmlBWURWUjBSQklHQU1INkMKTm1Oc2RYTjBaWEl0ZG1WeWMybHZiaTF2Y0dWeVlYUnZjaTV2Y0dWdWMyaHBablF0WTJ4MWMzUmxjaTEyWlhKegphVzl1TG5OMlk0SkVZMngxYzNSbGNpMTJaWEp6YVc5dUxXOXdaWEpoZEc5eUxtOXdaVzV6YUdsbWRDMWpiSFZ6CmRHVnlMWFpsY25OcGIyNHVjM1pqTG1Oc2RYTjBaWEl1Ykc5allXd3dOUVlMS3dZQkJBR1NDQkZrQWdFRUpoTWsKTWpjNVl6SXdNVEF0TmpCaE5TMDBOMll3TFdJek4yVXRabUkzTWpWaU16VTVaREptTUEwR0NTcUdTSWIzRFFFQgpDd1VBQTRJQkFRQVdMeHlYekFiU2xUNEc2RG51QWVCeklJVHJFNUpLQkNXVlBkc1hyZC9TbWs3RGVvaE9WV0JxCkVZcDFuYU41dy9HQlBrZGNSODAybHRYR1B1M1RWTVh4MjV3WFE1RHEwZU53LzNVQmNtMmFsZGQ1aUp4cHB2QnoKbUlRdGpBa0g0UlNNQXRNdVdlSjM3T2Y3Mk9qOXM3WmZxUUlaVmZ4Z0dKa2V4NVdKQUc1WmJMZzlkbUZSaG5yZAplTDJFRmloMlFYNVZSY3FlS2o1NWw5cThxMUpFOWdRaTQ4bDVndjRyMmY3dHBnaDZNa3ZtcjEwa3NKZnM4VHVnCkhybnZtbTNhMUc4ajMzTFRWOXkxbkluU3dxQ3RZQUdlRW0zL1FqZ3N4QlRXZkxxNExaRWdzekRSVGY1dC84eWQKRis3TzhlOEo0NEJMbWFVUk9XUXhkVEZCajlDODVqQ08KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlUTnczMHEzSFJFUXdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpnMk56UTBNakFlCkZ3MHlOakEwTWpJeE5ERTNNakphRncweU9EQTJNakF4TkRFM01qTmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTROamMwTkRJd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFES2V3YW9sZ2xsYVlDRmpTenpMYUtHRStoaTcwc2x3dVJrCkVxZy9aVXNRNkpSM2tCdU9zMzVnWjlmQlMxM01kVkxFVlFFdTBucFN1L3Y3cEJDang0U050UTh3aURVN2c1a3cKRXBYeFdFU1Vjb2E0SFg0amdENU8yVHd0N2p4RTY2ZjBQRno1Y3JPOTRqZ0JFa1FMV05nelNMQUZEc2hscXpqNQpQaFpuR3BRK3J1R05sUGJLYlNqZjFvb0ZRZ3haOTVIdmNBbUdtMkN3SmRpTUh0V0lTeVI0ZWJaWUxZR2N3OUIzCmJsLyt3Q0ZDc3JleTF4MU81bHlOK241RTkvZU8rd1lWNGlLaG5CTnJSbHl3M3BqSkwyZlFYMTFpU25SMFZQSmIKdEg4WVA5ZXZuRG1ocWJTNTM3d1VjRmJOSU91UkljN1gxVDF6Unp5R2NscmRjZGNXMUNnQkFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUjBpcExrCnJFS05YeUdmckd6b3FaaDhTR0ZMRXpBZkJnTlZIU01FR0RBV2dCUjBpcExrckVLTlh5R2ZyR3pvcVpoOFNHRkwKRXpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWJBTnRyNHlOSjFOc0VoSHBXeCsvd2FueitQOWlQMEF4YWpJQgovTWRsWGdxYWl4TnBXajJ5ellvd2I1OHp2alI0RzlibytBV1BOSUYwY2Nzd1FsdXM4SXBVTXQ4V1R2YjVSWGYyCnZCYnFSbEx4Y2VZSGZtL0swU1pJc2k1K0s4QVZTdnN0eVg5NjRmNGp5d3plejdWNno1ZU5WNUk0SWtMSnJrV0UKZHFONjJjeGo1WVo4SkptUmtTRUtSUStVNk1lNVFuU1lSMXI1dEpwaHdNMU80MXJHMUo4UXpMbXBrVFRwYlpTMwpybzlKV2YwcUo2NCthL0MxZEsvOXZsNEFRZldyUkNjY3N6dktVSEZKa1hVVmEyT3hrK2NHMVdxTlJSa1NnMEJWClhZNjQ5RzZaVStYNTRUek8zcnd6aHMxUkY2YUNwNmtOZzVCNTM0NWt4MDdvaUUyMWtBPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/cluster-version-operator with hostname cluster-version-operator.openshift-cluster-version.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: cluster-version-operator-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T14:17:27Z" service.beta.openshift.io/expiry: "2028-04-21T14:17:27Z" service.beta.openshift.io/originating-service-name: cluster-version-operator service.beta.openshift.io/originating-service-uid: 279c2010-60a5-47f0-b37e-fb725b359d2f creationTimestamp: "2026-04-22T14:17:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"279c2010-60a5-47f0-b37e-fb725b359d2f"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T14:17:28Z" name: cluster-version-operator-serving-cert namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: Service name: cluster-version-operator uid: 279c2010-60a5-47f0-b37e-fb725b359d2f resourceVersion: "7869" uid: fe313a42-869e-4459-b568-a5fa6bced275 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T14:11:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1479b90a-656c-4153-8bfa-6137b6749e27"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:11:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:11:47Z" name: default-dockercfg-l7jm7 namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 1479b90a-656c-4153-8bfa-6137b6749e27 resourceVersion: "4004" uid: b4fe4bc3-75e6-45af-a071-26d865b9bbb5 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgzMCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T14:11:11Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1e09a418-1c33-4e2a-8fba-f7a4f37c7e5c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:11:11Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:11:48Z" name: deployer-dockercfg-97n9g namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 1e09a418-1c33-4e2a-8fba-f7a4f37c7e5c resourceVersion: "4121" uid: e5c21091-6749-49dc-8ffd-82cedb1ea097 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "38601"