--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T18:17:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:17:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9ea18baa-103d-45e3-81ce-e767d334f117"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:17:35Z" name: builder-dockercfg-5kczk namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 9ea18baa-103d-45e3-81ce-e767d334f117 resourceVersion: "4060" uid: 3371cf7e-87c7-490e-a764-f0d91600e669 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/cluster-version-operator with hostname cluster-version-operator.openshift-cluster-version.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: cluster-version-operator-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T18:23:00Z" service.beta.openshift.io/expiry: "2028-04-21T18:23:00Z" service.beta.openshift.io/originating-service-name: cluster-version-operator service.beta.openshift.io/originating-service-uid: 61f041fe-f6ca-4fef-8525-45d329376c55 creationTimestamp: "2026-04-22T18:23:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"61f041fe-f6ca-4fef-8525-45d329376c55"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T18:23:00Z" name: cluster-version-operator-serving-cert namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: Service name: cluster-version-operator uid: 61f041fe-f6ca-4fef-8525-45d329376c55 resourceVersion: "7703" uid: 344f206f-6c0c-429e-8f5d-0cac66baf869 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T18:17:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"727282fa-d6c4-4d7c-8a80-12218fe28ded"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:17:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:17:30Z" name: default-dockercfg-zvqs8 namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 727282fa-d6c4-4d7c-8a80-12218fe28ded resourceVersion: "3476" uid: 63e9c365-88a9-4e86-9c64-12712e84c88b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgzMSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T18:17:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:17:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"becd4972-5ba5-497d-b6ac-139f3365b2f1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:17:35Z" name: deployer-dockercfg-nqrkx namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: becd4972-5ba5-497d-b6ac-139f3365b2f1 resourceVersion: "4063" uid: 9419afb2-2d03-42d8-81e2-a5f103203706 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "11063"