--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T14:50:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f87a118f-348a-4334-b35e-a7fe38a89626"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:50:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T15:26:31Z" name: builder-dockercfg-qk8rj namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: f87a118f-348a-4334-b35e-a7fe38a89626 resourceVersion: "44260" uid: d9759e8f-0ddf-49e3-9c5a-ed8933780411 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/cluster-version-operator with hostname cluster-version-operator.openshift-cluster-version.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: cluster-version-operator-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T14:56:08Z" service.beta.openshift.io/expiry: "2028-04-19T14:56:08Z" service.beta.openshift.io/originating-service-name: cluster-version-operator service.beta.openshift.io/originating-service-uid: 0dcd2ddd-6347-4ea6-a974-15386492a93c creationTimestamp: "2026-04-20T14:56:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"0dcd2ddd-6347-4ea6-a974-15386492a93c"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T14:56:09Z" name: cluster-version-operator-serving-cert namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: Service name: cluster-version-operator uid: 0dcd2ddd-6347-4ea6-a974-15386492a93c resourceVersion: "7701" uid: 327e3b45-c60f-4a2d-bc24-7fb2773b92db type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T14:50:26Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"dd20a201-3f56-4e7d-a115-70ccb15dcac5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:50:26Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T15:26:26Z" name: default-dockercfg-vp8sc namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: dd20a201-3f56-4e7d-a115-70ccb15dcac5 resourceVersion: "44034" uid: 90a3c4d1-c224-4ae1-a59f-170549f10392 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgzMCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T14:50:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"628d50b7-6543-4984-b091-22fc984f7f91"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:50:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T15:26:31Z" name: deployer-dockercfg-776x5 namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 628d50b7-6543-4984-b091-22fc984f7f91 resourceVersion: "44268" uid: f33f0b1b-e025-42c7-b12c-93421ff1296e type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "45731"