--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T21:34:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T21:34:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5ca5a92c-9336-47b2-852b-ab52f9df4ba2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T21:34:09Z" name: builder-dockercfg-psmmz namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 5ca5a92c-9336-47b2-852b-ab52f9df4ba2 resourceVersion: "3878" uid: b354fc83-1808-41e2-9d25-b49aebf54231 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/cluster-version-operator with hostname cluster-version-operator.openshift-cluster-version.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: cluster-version-operator-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T21:37:26Z" service.beta.openshift.io/expiry: "2028-04-16T21:37:26Z" service.beta.openshift.io/originating-service-name: cluster-version-operator service.beta.openshift.io/originating-service-uid: 53ec4084-ec17-4a7c-a668-547ade03d37c creationTimestamp: "2026-04-17T21:37:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"53ec4084-ec17-4a7c-a668-547ade03d37c"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T21:37:27Z" name: cluster-version-operator-serving-cert namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: Service name: cluster-version-operator uid: 53ec4084-ec17-4a7c-a668-547ade03d37c resourceVersion: "6818" uid: 8d2671b4-35c5-4325-9098-7283d69d4109 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T21:34:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ca0fe674-f9fa-4280-a518-47cb0c9d5fa5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T21:34:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T21:34:04Z" name: default-dockercfg-jv5l9 namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: ca0fe674-f9fa-4280-a518-47cb0c9d5fa5 resourceVersion: "3165" uid: 5e9feb0b-59f1-4e42-b8b2-e4074c93d661 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgzMSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T21:34:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T21:34:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ef385cec-3267-4436-bfdf-545c73113e4c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T21:34:09Z" name: deployer-dockercfg-7qkww namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: ef385cec-3267-4436-bfdf-545c73113e4c resourceVersion: "3879" uid: bed65267-d261-4e3c-a2ae-2a3609087fe1 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "40728"