--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T18:11:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"53dd2102-36c0-4b07-bec3-b7b3c4e16a82"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:11:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:47:46Z" name: builder-dockercfg-ngvkr namespace: openshift-service-ca ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 53dd2102-36c0-4b07-bec3-b7b3c4e16a82 resourceVersion: "28087" uid: c16e4c80-11be-4652-b2b0-60f29f41e7a9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T18:11:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7c1b3f16-7b29-4515-8bd9-719135b2c668"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:11:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:47:46Z" name: default-dockercfg-rbxrw namespace: openshift-service-ca ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 7c1b3f16-7b29-4515-8bd9-719135b2c668 resourceVersion: "28083" uid: 02ef3a8b-12f1-40d9-9c8c-3771ff558cde type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc3MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T18:11:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8533fd66-d4db-45ec-aa6c-8adcf4ec21f8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:11:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:47:46Z" name: deployer-dockercfg-jgqdb namespace: openshift-service-ca ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 8533fd66-d4db-45ec-aa6c-8adcf4ec21f8 resourceVersion: "28084" uid: 3347c0f8-f370-414c-989b-37aa279d2a38 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: service-ca creationTimestamp: "2026-04-16T18:11:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2b8f1c7a-3d1e-43ec-9199-1c3360dedb95"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:11:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:47:46Z" name: service-ca-dockercfg-6vvqk namespace: openshift-service-ca ownerReferences: - apiVersion: v1 kind: ServiceAccount name: service-ca uid: 2b8f1c7a-3d1e-43ec-9199-1c3360dedb95 resourceVersion: "28088" uid: 9a972592-ad0e-474c-947c-cdfd9f6403b0 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: Service CA secret contains a signing key that will be used to issue a signed serving certificate/key pair to services annotated with 'service.beta.openshift.io/serving-cert-secret-name' openshift.io/owning-component: service-ca creationTimestamp: "2026-04-16T18:11:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T18:11:47Z" name: signing-key namespace: openshift-service-ca resourceVersion: "7447" uid: 79f18d9a-e08e-4824-9dc6-58c3829f3a24 type: kubernetes.io/tls kind: SecretList metadata: resourceVersion: "41711"