--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-23T08:47:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T08:47:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5e8d8a7f-c651-4b6c-9d85-97b79a14f347"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T08:47:42Z" name: builder-dockercfg-qp82r namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 5e8d8a7f-c651-4b6c-9d85-97b79a14f347 resourceVersion: "3984" uid: ac502916-d21e-4b66-a197-bea5fccadb93 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/cluster-version-operator with hostname cluster-version-operator.openshift-cluster-version.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: cluster-version-operator-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-22T08:53:07Z" service.beta.openshift.io/expiry: "2028-04-22T08:53:07Z" service.beta.openshift.io/originating-service-name: cluster-version-operator service.beta.openshift.io/originating-service-uid: 36f4b103-9d1c-4d92-b600-9341177e803f creationTimestamp: "2026-04-23T08:53:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"36f4b103-9d1c-4d92-b600-9341177e803f"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-23T08:53:08Z" name: cluster-version-operator-serving-cert namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: Service name: cluster-version-operator uid: 36f4b103-9d1c-4d92-b600-9341177e803f resourceVersion: "7597" uid: 2be4d311-f58e-43ea-8db9-092cf1e37398 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-23T08:47:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5611c442-d30e-4788-9ec7-7e8d2d5a1b85"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T08:47:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T08:47:37Z" name: default-dockercfg-6ct27 namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 5611c442-d30e-4788-9ec7-7e8d2d5a1b85 resourceVersion: "3351" uid: 8385ae30-2cbc-4d81-baa4-50a1310481e5 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgzMCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-23T08:47:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T08:47:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bd442d37-fab6-4354-89b9-b265896fdae5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T08:47:42Z" name: deployer-dockercfg-kz9vf namespace: openshift-cluster-version ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: bd442d37-fab6-4354-89b9-b265896fdae5 resourceVersion: "3989" uid: 7523dd2e-9f2c-4230-a68c-4b1e90bf35ad type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "15933"