--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-21T14:22:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"12342207-1d72-4487-bb76-2ad4c3f0376f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:22:06Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T14:58:06Z" name: builder-dockercfg-rlvd8 namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 12342207-1d72-4487-bb76-2ad4c3f0376f resourceVersion: "39397" uid: f79bd2a4-7e33-49cb-84f5-610b8811a840 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/cluster-version-operator with hostname cluster-version-operator.openshift-cluster-version.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: cluster-version-operator-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T14:27:57Z" service.beta.openshift.io/expiry: "2028-04-20T14:27:57Z" service.beta.openshift.io/originating-service-name: cluster-version-operator service.beta.openshift.io/originating-service-uid: d2d9499e-b607-4088-9979-c28528787210 creationTimestamp: "2026-04-21T14:27:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"d2d9499e-b607-4088-9979-c28528787210"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T14:27:57Z" name: cluster-version-operator-serving-cert namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: Service name: cluster-version-operator uid: d2d9499e-b607-4088-9979-c28528787210 resourceVersion: "7691" uid: 3a193599-4461-4415-aae4-dfd366a49392 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-21T14:22:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"588b73e4-6fc0-4382-b627-e19f03f993a9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:22:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T14:58:02Z" name: default-dockercfg-nbdp7 namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 588b73e4-6fc0-4382-b627-e19f03f993a9 resourceVersion: "39269" uid: 617308c2-2fbb-409d-b814-b7546ce94dbb type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgzMSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-21T14:22:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"55f4c0a0-d893-40c8-8526-35e55173d4c5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:22:06Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T14:58:06Z" name: deployer-dockercfg-wcq8l namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 55f4c0a0-d893-40c8-8526-35e55173d4c5 resourceVersion: "39399" uid: 1aec8e52-e842-4f68-80d9-5ec551c94a5d type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "50783"