--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T09:08:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T09:08:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3aa47630-4823-445d-8a68-93856cadd293"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T09:08:04Z" name: builder-dockercfg-rd9mk namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 3aa47630-4823-445d-8a68-93856cadd293 resourceVersion: "4107" uid: 6fa7228b-f03c-4c0f-b5fa-f569e500b63c type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/cluster-version-operator with hostname cluster-version-operator.openshift-cluster-version.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: cluster-version-operator-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T09:13:29Z" service.beta.openshift.io/expiry: "2028-04-16T09:13:29Z" service.beta.openshift.io/originating-service-name: cluster-version-operator service.beta.openshift.io/originating-service-uid: 86dba478-cbf2-4782-9fb6-c7ad5671b8ed creationTimestamp: "2026-04-17T09:13:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"86dba478-cbf2-4782-9fb6-c7ad5671b8ed"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T09:13:29Z" name: cluster-version-operator-serving-cert namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: Service name: cluster-version-operator uid: 86dba478-cbf2-4782-9fb6-c7ad5671b8ed resourceVersion: "7767" uid: 18de0e67-7e8f-4d39-86f7-495ce9059d55 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T09:07:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ddf87fb4-f8c4-4ea5-ae7e-7def68104b7d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T09:07:58Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T09:07:59Z" name: default-dockercfg-nw8vk namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: ddf87fb4-f8c4-4ea5-ae7e-7def68104b7d resourceVersion: "3549" uid: 9f839856-77cf-4f9d-8cd9-752c9a1abd7c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgzMSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T09:08:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T09:08:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"81e32430-48df-4ecd-a89f-a4094c193323"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T09:08:04Z" name: deployer-dockercfg-dvtt7 namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 81e32430-48df-4ecd-a89f-a4094c193323 resourceVersion: "4110" uid: f584ef76-2508-4ba4-8160-692fc30f43fc type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "13690"