--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T21:23:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"367de495-e2c0-4ec1-9215-daf7375e981c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:23:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:59:04Z" name: builder-dockercfg-v257n namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 367de495-e2c0-4ec1-9215-daf7375e981c resourceVersion: "25488" uid: 43ab9ba7-c77f-405d-a711-e597932e754e type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/cluster-version-operator with hostname cluster-version-operator.openshift-cluster-version.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: cluster-version-operator-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T21:29:22Z" service.beta.openshift.io/expiry: "2028-04-23T21:29:22Z" service.beta.openshift.io/originating-service-name: cluster-version-operator service.beta.openshift.io/originating-service-uid: 4e62a489-c987-450d-8f0e-142a8e37122b creationTimestamp: "2026-04-24T21:29:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"4e62a489-c987-450d-8f0e-142a8e37122b"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T21:29:22Z" name: cluster-version-operator-serving-cert namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: Service name: cluster-version-operator uid: 4e62a489-c987-450d-8f0e-142a8e37122b resourceVersion: "7863" uid: e39661cc-dd60-4144-b2db-8112baf6f099 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T21:22:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"31ee69e8-c3cf-45cd-b7f5-3f3fd8720243"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:22:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:58:59Z" name: default-dockercfg-tw69v namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 31ee69e8-c3cf-45cd-b7f5-3f3fd8720243 resourceVersion: "25313" uid: 1b92a812-2762-4837-8a69-36fadcaf8573 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgzMSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T21:23:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8b672b08-a474-4088-a9a1-675732a08c82"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:23:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:59:04Z" name: deployer-dockercfg-ttq8c namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 8b672b08-a474-4088-a9a1-675732a08c82 resourceVersion: "25472" uid: 9977978b-83c1-44da-9f40-76405185ec9b type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "33420"