--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T07:59:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T07:59:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"65032673-46f6-4723-8aa0-91c9385c2c03"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:59:14Z" name: builder-dockercfg-n95j8 namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 65032673-46f6-4723-8aa0-91c9385c2c03 resourceVersion: "3994" uid: 375037d8-b1f1-4994-a458-c7a4aa2418e9 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/cluster-version-operator with hostname cluster-version-operator.openshift-cluster-version.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: cluster-version-operator-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T08:04:42Z" service.beta.openshift.io/expiry: "2028-04-16T08:04:42Z" service.beta.openshift.io/originating-service-name: cluster-version-operator service.beta.openshift.io/originating-service-uid: 50357fc1-6980-417e-bc1d-bc6ac95f8cb1 creationTimestamp: "2026-04-17T08:04:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"50357fc1-6980-417e-bc1d-bc6ac95f8cb1"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T08:04:42Z" name: cluster-version-operator-serving-cert namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: Service name: cluster-version-operator uid: 50357fc1-6980-417e-bc1d-bc6ac95f8cb1 resourceVersion: "7648" uid: f2e42723-1f94-4962-85a6-acfe2b0a75c7 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T07:59:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f32a9d8d-7ba0-438f-a0f9-baf140ea0af4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:59:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T07:59:09Z" name: default-dockercfg-s5tvz namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: f32a9d8d-7ba0-438f-a0f9-baf140ea0af4 resourceVersion: "3380" uid: 859ab585-6d95-4ade-ab8e-b1ee05e757d1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgzMCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T07:59:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T07:59:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b4fe5cc5-ee10-4331-a691-a99a239bc081"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:59:14Z" name: deployer-dockercfg-4pdtc namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: b4fe5cc5-ee10-4331-a691-a99a239bc081 resourceVersion: "3995" uid: e84b5cfe-88ae-4913-98de-a17f01df6fa4 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "13266"