--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T20:00:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:00:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9932a540-1835-43f8-959b-cb4f9f23b5d8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:00:09Z" name: builder-dockercfg-mll79 namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 9932a540-1835-43f8-959b-cb4f9f23b5d8 resourceVersion: "3640" uid: 0c9b72df-64ae-439a-8b56-7a02f66ef543 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/cluster-version-operator with hostname cluster-version-operator.openshift-cluster-version.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: cluster-version-operator-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T20:05:47Z" service.beta.openshift.io/expiry: "2028-04-16T20:05:47Z" service.beta.openshift.io/originating-service-name: cluster-version-operator service.beta.openshift.io/originating-service-uid: 7f90a4b8-584d-47ef-bc7d-af042dd8b579 creationTimestamp: "2026-04-17T20:05:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"7f90a4b8-584d-47ef-bc7d-af042dd8b579"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T20:05:48Z" name: cluster-version-operator-serving-cert namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: Service name: cluster-version-operator uid: 7f90a4b8-584d-47ef-bc7d-af042dd8b579 resourceVersion: "7688" uid: 0e8cf9b9-7613-4115-9cad-9cf105a008a7 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T20:00:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"458b3166-865c-444a-adfc-1c420df1475b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:00:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:00:04Z" name: default-dockercfg-rdj7n namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 458b3166-865c-444a-adfc-1c420df1475b resourceVersion: "3016" uid: 601b94bf-5a9a-4b68-820d-8940695aabba type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgzMSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T20:00:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:00:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8fa2699c-6d79-4226-a627-4d501f3c9e58"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:00:09Z" name: deployer-dockercfg-zz28j namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 8fa2699c-6d79-4226-a627-4d501f3c9e58 resourceVersion: "3645" uid: b1568cf1-b278-4e60-b66f-015241ebb07b type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "27220"