--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T18:39:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a3d2e8b8-8379-465c-9402-576a5beb4854"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:39:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:15:05Z" name: builder-dockercfg-rz49l namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: a3d2e8b8-8379-465c-9402-576a5beb4854 resourceVersion: "40980" uid: 7dc9298a-0921-4505-931e-eca7f762c77d type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/cluster-version-operator with hostname cluster-version-operator.openshift-cluster-version.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: cluster-version-operator-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T18:45:01Z" service.beta.openshift.io/expiry: "2028-04-21T18:45:01Z" service.beta.openshift.io/originating-service-name: cluster-version-operator service.beta.openshift.io/originating-service-uid: ecdd8038-1168-4235-90a6-ca1194b459ab creationTimestamp: "2026-04-22T18:45:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"ecdd8038-1168-4235-90a6-ca1194b459ab"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T18:45:02Z" name: cluster-version-operator-serving-cert namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: Service name: cluster-version-operator uid: ecdd8038-1168-4235-90a6-ca1194b459ab resourceVersion: "7822" uid: 6777f171-df5f-44de-8061-5baf906b6091 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T18:39:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"366fc993-ea11-43a3-844d-b29af2473f2b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:39:00Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:15:00Z" name: default-dockercfg-fwthr namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 366fc993-ea11-43a3-844d-b29af2473f2b resourceVersion: "40761" uid: b0d4f0e4-d139-4536-a312-d620757df739 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgzMSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T18:39:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c844fa40-1bc9-49c0-a181-148defafa6b7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:39:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:15:05Z" name: deployer-dockercfg-jmgkg namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: c844fa40-1bc9-49c0-a181-148defafa6b7 resourceVersion: "40967" uid: 5a302aca-e7b1-4c0b-b4dd-a9ff7ef9be39 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "46466"