--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T13:08:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2a7ace83-4b15-475d-88cc-442b870fc401"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:08:06Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:44:06Z" name: builder-dockercfg-vq282 namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 2a7ace83-4b15-475d-88cc-442b870fc401 resourceVersion: "44157" uid: a2420040-8d67-46bd-96dc-239878370299 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/cluster-version-operator with hostname cluster-version-operator.openshift-cluster-version.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: cluster-version-operator-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T13:13:58Z" service.beta.openshift.io/expiry: "2028-04-15T13:13:58Z" service.beta.openshift.io/originating-service-name: cluster-version-operator service.beta.openshift.io/originating-service-uid: 0bc3e6f8-8066-4824-ba0a-1fbf49e20e6b creationTimestamp: "2026-04-16T13:13:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"0bc3e6f8-8066-4824-ba0a-1fbf49e20e6b"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T13:13:59Z" name: cluster-version-operator-serving-cert namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: Service name: cluster-version-operator uid: 0bc3e6f8-8066-4824-ba0a-1fbf49e20e6b resourceVersion: "7813" uid: 91819cbe-ea06-40e7-8660-59c76040d8ee type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T13:08:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d6b013f7-8081-4c81-a447-cdbe5138ca32"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:08:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:44:01Z" name: default-dockercfg-9gwr4 namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: d6b013f7-8081-4c81-a447-cdbe5138ca32 resourceVersion: "43977" uid: 9b10f916-3d5f-41e4-832d-53f0c03526c0 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgzMSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T13:08:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e12c1956-51a0-479b-9e91-4acfe841b9db"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:08:06Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:44:06Z" name: deployer-dockercfg-sbqbq namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: e12c1956-51a0-479b-9e91-4acfe841b9db resourceVersion: "44154" uid: adf5c52b-69c7-4391-b12b-7ca1dff721dd type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "44542"