--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T21:06:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T21:06:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"30ebee5e-c625-4567-98e9-50293042ffd7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T21:06:14Z" name: builder-dockercfg-8qzrh namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 30ebee5e-c625-4567-98e9-50293042ffd7 resourceVersion: "4171" uid: 78e8a4f0-f478-4aba-b1e6-a61c1ac66fa3 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/cluster-version-operator with hostname cluster-version-operator.openshift-cluster-version.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: cluster-version-operator-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T21:09:29Z" service.beta.openshift.io/expiry: "2028-04-21T21:09:29Z" service.beta.openshift.io/originating-service-name: cluster-version-operator service.beta.openshift.io/originating-service-uid: fab64c5a-825d-4db2-a6a3-4cd1c809c0f3 creationTimestamp: "2026-04-22T21:09:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"fab64c5a-825d-4db2-a6a3-4cd1c809c0f3"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T21:09:30Z" name: cluster-version-operator-serving-cert namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: Service name: cluster-version-operator uid: fab64c5a-825d-4db2-a6a3-4cd1c809c0f3 resourceVersion: "7046" uid: f30ab7f3-1209-4623-8e15-54af043afe46 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T21:06:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T21:06:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"810bd0bd-3d13-4443-8100-14c673af224b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T21:06:09Z" name: default-dockercfg-9grgv namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 810bd0bd-3d13-4443-8100-14c673af224b resourceVersion: "3586" uid: 9f484e9f-10e9-4194-9dfc-126a9941e5a7 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgzMCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T21:06:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T21:06:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"140c92b6-cbe1-4685-85ca-e1e7ffa0e876"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T21:06:14Z" name: deployer-dockercfg-lpd7f namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 140c92b6-cbe1-4685-85ca-e1e7ffa0e876 resourceVersion: "4172" uid: a60392a8-b2d4-41e0-ae3e-4d8be1f2f23b type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "45096"