--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-21T17:30:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d1b257cd-0179-4072-9e85-9e7ad70fb049"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T17:30:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T18:06:20Z" name: builder-dockercfg-g77jd namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: d1b257cd-0179-4072-9e85-9e7ad70fb049 resourceVersion: "43506" uid: a446a51e-8eee-492c-8de2-163eae9902ca type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/cluster-version-operator with hostname cluster-version-operator.openshift-cluster-version.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: cluster-version-operator-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T17:35:59Z" service.beta.openshift.io/expiry: "2028-04-20T17:35:59Z" service.beta.openshift.io/originating-service-name: cluster-version-operator service.beta.openshift.io/originating-service-uid: 4aa0c19a-0258-455e-aa2e-3ba924c3a9a5 creationTimestamp: "2026-04-21T17:36:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"4aa0c19a-0258-455e-aa2e-3ba924c3a9a5"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T17:36:00Z" name: cluster-version-operator-serving-cert namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: Service name: cluster-version-operator uid: 4aa0c19a-0258-455e-aa2e-3ba924c3a9a5 resourceVersion: "7674" uid: 6ec32ffa-68e4-429c-95d4-a9b22893ce5c type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-21T17:30:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2267c1d8-588f-423e-b802-3b4fda748c02"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T17:30:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T18:06:15Z" name: default-dockercfg-9dxmf namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 2267c1d8-588f-423e-b802-3b4fda748c02 resourceVersion: "43278" uid: 2f066551-6cae-4d22-9150-26c785681198 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgzMSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-21T17:30:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b3b06402-40f7-4761-81a4-5c253913cde6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T17:30:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T18:06:20Z" name: deployer-dockercfg-24r6s namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: b3b06402-40f7-4761-81a4-5c253913cde6 resourceVersion: "43504" uid: 5e9b9fb8-41cc-48f4-8671-9fd45677ffe6 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "47164"