--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T09:16:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T09:16:53Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a3ce4222-305a-4fb9-bbc2-f5655d936ffd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T09:16:53Z" name: builder-dockercfg-bjm9m namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: a3ce4222-305a-4fb9-bbc2-f5655d936ffd resourceVersion: "4120" uid: b0c1b10a-9a28-49fb-82ff-42d2fb31cc22 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVORENDQXh5Z0F3SUJBZ0lJRTAzb3Y1enFDQXN3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qUXhOemM0TVRBZQpGdzB5TmpBME1UY3dPVEl6TURSYUZ3MHlPREEwTVRZd09USXpNRFZhTUVFeFB6QTlCZ05WQkFNVE5tTnNkWE4wClpYSXRkbVZ5YzJsdmJpMXZjR1Z5WVhSdmNpNXZjR1Z1YzJocFpuUXRZMngxYzNSbGNpMTJaWEp6YVc5dUxuTjIKWXpDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVBBRENDQVFvQ2dnRUJBTVF2ZEJXcWI2ZFlLWm1Ja0J3Nwo3RDk2NEtybzRtWGdHNXZ4cVI5WTA4QzViUVVCMlZrOW5OOGhka0lGbHJlVjduc2dnb2JaM2dGeUt3RGpnNTRpCkFWN3FscDhwSmN0QXpWcVMwTURiano1RzdaVUxZU2doSUlzRTUwQzNpNnYreTJ1UngxMExJd21ueXFFMHZjRkEKZXRHUEpVQ2QrS0FMK2E4U1JQWTVabXMyRU5GQkIxUXphMHZNSWlOOUJPRXlCcEJOT2hibFhCQ1lSckRzUkJKcQpTYUg1dmlSYXVWYUxXS2R1WWFNTlo2U29MK0p1VVI4NEV2dFBRMW5VczNZYVZuc0RPSGtPaWtyS1NCRHp6TmN5ClB5TTJPOWloK0o5cDV2QkxnNWpUQ1pKMzBXZFBtd0U5WGdkMkU4SHdZbEh5QkNOSkRiREtscXJrc25tL1VmNmoKbkNzQ0F3RUFBYU9DQVRrd2dnRTFNQTRHQTFVZER3RUIvd1FFQXdJRm9EQVRCZ05WSFNVRUREQUtCZ2dyQmdFRgpCUWNEQVRBTUJnTlZIUk1CQWY4RUFqQUFNQjBHQTFVZERnUVdCQlFTclhlTDBMMENDMWIzOXpQdzErTjlpYndTCm16QWZCZ05WSFNNRUdEQVdnQlRteHEwWXBUUjVIUDVJSWJjUWRzeTZwYVZqSHpDQmlBWURWUjBSQklHQU1INkMKTm1Oc2RYTjBaWEl0ZG1WeWMybHZiaTF2Y0dWeVlYUnZjaTV2Y0dWdWMyaHBablF0WTJ4MWMzUmxjaTEyWlhKegphVzl1TG5OMlk0SkVZMngxYzNSbGNpMTJaWEp6YVc5dUxXOXdaWEpoZEc5eUxtOXdaVzV6YUdsbWRDMWpiSFZ6CmRHVnlMWFpsY25OcGIyNHVjM1pqTG1Oc2RYTjBaWEl1Ykc5allXd3dOUVlMS3dZQkJBR1NDQkZrQWdFRUpoTWsKWlRSaFlURmxaREV0T0RWaE1TMDBPREUwTFRrMVl6RXRORGxqTkRJellXVTVZalU1TUEwR0NTcUdTSWIzRFFFQgpDd1VBQTRJQkFRQUpQQ0NxVExWWk9QVHowRXM3VXNxZ1JXeEUxTklwUzdDektWS1dUUXIyK3BvUGE1VmpIQkZWCjFOVVZyYmVac1ZXOGc4MUJYdTFFMFJrc3llb1pwVW9jWCtlbStPUjlqNEtvcnRvSmpRVXFCQVVRa3M3NGpmUHEKL0p5T1pyWHA5SmhJUzgxa2N3SWhaeDNMdS8ydVo5K3dTMk0xblp6Z2o1cWJuN01CSFozWDRSaGFlUEVsUXJHNgpKdTB4Rjd1QzAxTXhLYkpmdy8reDA2ZWhqNmovbWNwOExIdzlzMncxa2ZmZkxRODlJdmRFZVFrTlFRQnFrWlpCCkszOXdYSGNieUJjREJyM25iVnViQ0NHQUY5cjNtU0lIdzJZWjloZnVVSWJ2SXozRDlpd3UvUU5zYTRteGk4OUkKKzJXY2ljUm4wd21NaDVib1dGWmFxRGRQSDE4cFdoQmIKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlZSkRLUDNOWnZDRXdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpReE56YzRNVEFlCkZ3MHlOakEwTVRjd09USXpNREJhRncweU9EQTJNVFV3T1RJek1ERmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTBNVGMzT0RFd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFEMG9tQ3YzL1lxQXpXd0hKYmdTMlczeDlTVG1sem5EaWJKCjVFeFJlRCtjMDE0eVJpejlDQW9WSVRzKy9oZWRoNDliaW9pbFRLMVFUa1AzQlNmMW13U0JXL1BaWU9vUy9DalMKODlqemxsTUtKRzk5VEJiOGRxZm1iL1dLRkkvTVVLSTRNeThuRlF0V0F0M3QvS0ZLQjZqdVR4VEdaalJQcUlnSgo3Y3JsSVVPWWN4bzg2ME5jR0R2YjhuOENBZ1kxWERzU3EydjM3bUtCVXlHcmUrYnRkeVMramtIbG8yM0ZhQnRwCnhqaE1RRmlicUJHZFg2ZjdRK2F2WmNnYVdDWGxuYmVBL0grbGlLVW9WQTB4dytRQ2xjWXB3dTZyOHgybmMvQ0IKMU5JUGNiUnlkSjk4Y01pMDN6SDNXcCszcTRBTEJHWHpNdTByaFQ5aENYMWpMeG50VFJuWEFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCVG14cTBZCnBUUjVIUDVJSWJjUWRzeTZwYVZqSHpBZkJnTlZIU01FR0RBV2dCVG14cTBZcFRSNUhQNUlJYmNRZHN5NnBhVmoKSHpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQXdYTW0yQkRodlBqdnhnTlc2dy9QeGpsR1liMnlwVFRtRDh5RQpxM25hbmJsSEZ6Z2FHNWxmRUw4N1gvL3lneDRpZDVTU1VMemJDbE4zK2cvVVFnRHJzUENPRUQ4bnhQWjNMZGlqCkFoT3ZZZm9xdFBlME12YzBYcWltcXE4M3BTQ0RNS09ySzRSNHRTd0w2WVpES3pWTnhpRHNWQTdURzVBZnhzeGYKbzZEUkN6aDdFMGZxUnp0bUlPSnhxYUFEakpBUy9Oakp0a1lETjFiZVZuQ0djUlB6WFZnSk9qUGxuVXVDdmtSVgpEWktDV3Vidk5jd2FNdnBnOEJUK0tOOEt0WE82T0JMcHpXVnZ0bEUrbHY4cEgvRU5hMkpVV3VEbW9qcG9GRXNsCndRVkZ4SDVRa0cvcHlSaTY4ZEVnZ3dzR244ckpCTEh5bUdSOGloYU1VczlqYlF1WHhnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/cluster-version-operator with hostname cluster-version-operator.openshift-cluster-version.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: cluster-version-operator-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T09:23:05Z" service.beta.openshift.io/expiry: "2028-04-16T09:23:05Z" service.beta.openshift.io/originating-service-name: cluster-version-operator service.beta.openshift.io/originating-service-uid: e4aa1ed1-85a1-4814-95c1-49c423ae9b59 creationTimestamp: "2026-04-17T09:23:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"e4aa1ed1-85a1-4814-95c1-49c423ae9b59"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T09:23:06Z" name: cluster-version-operator-serving-cert namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: Service name: cluster-version-operator uid: e4aa1ed1-85a1-4814-95c1-49c423ae9b59 resourceVersion: "8078" uid: 6f2610ff-636e-4e19-944c-699326797ca2 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T09:16:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e1e7d0cd-0716-4d19-9892-540b77118609"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T09:16:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T09:16:48Z" name: default-dockercfg-psdr8 namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: e1e7d0cd-0716-4d19-9892-540b77118609 resourceVersion: "3535" uid: 46b38b4b-a84b-4ee3-b428-98888b76dacf type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgyOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T09:16:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T09:16:53Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4b8e0865-8e3b-4ab8-a1c4-951c4ff9f6e3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T09:16:53Z" name: deployer-dockercfg-94bx9 namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 4b8e0865-8e3b-4ab8-a1c4-951c4ff9f6e3 resourceVersion: "4107" uid: 69772dec-6c1b-4b7d-ba1b-82e169b5980f type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "13990"