--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T14:26:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:26:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"92a3115b-b04a-4991-95c5-208256e8d427"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:26:36Z" name: builder-dockercfg-wh5pv namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 92a3115b-b04a-4991-95c5-208256e8d427 resourceVersion: "4111" uid: c1f9341b-2e6e-413b-90f3-31cc019aa7fb type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/cluster-version-operator with hostname cluster-version-operator.openshift-cluster-version.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: cluster-version-operator-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T14:31:58Z" service.beta.openshift.io/expiry: "2028-04-15T14:31:58Z" service.beta.openshift.io/originating-service-name: cluster-version-operator service.beta.openshift.io/originating-service-uid: 1467130f-2cb0-4b17-960f-931bc090fa4b creationTimestamp: "2026-04-16T14:31:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"1467130f-2cb0-4b17-960f-931bc090fa4b"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T14:31:59Z" name: cluster-version-operator-serving-cert namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: Service name: cluster-version-operator uid: 1467130f-2cb0-4b17-960f-931bc090fa4b resourceVersion: "7666" uid: 1f07e54b-1c5b-4d16-afef-960082ec2e4f type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T14:26:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4603b192-bc83-4384-961a-b5a1831ac0da"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:26:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:26:31Z" name: default-dockercfg-djv5q namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 4603b192-bc83-4384-961a-b5a1831ac0da resourceVersion: "3532" uid: 32a204a7-5543-456b-821f-8fee4e5b9490 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgzMSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T14:26:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:26:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bc4af75f-8497-4ba5-9c50-8742f624b37e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:26:36Z" name: deployer-dockercfg-l6v5t namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: bc4af75f-8497-4ba5-9c50-8742f624b37e resourceVersion: "4110" uid: 031184fd-6b7d-4a39-be9a-305d52070bec type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "29281"