--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-05-06T17:07:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e73eb348-7ffd-4275-9b1b-66732f687e3b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-05-06T17:07:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-05-06T17:43:22Z" name: builder-dockercfg-kng4w namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: e73eb348-7ffd-4275-9b1b-66732f687e3b resourceVersion: "37327" uid: 69f27201-daa5-49e1-921e-ad8249f57ed5 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-05-06T17:07:17Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"85ff1fb3-3f8c-4292-84e2-3caaa409d2e2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-05-06T17:07:17Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-05-06T17:43:17Z" name: cluster-image-registry-operator-dockercfg-ws7bt namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 85ff1fb3-3f8c-4292-84e2-3caaa409d2e2 resourceVersion: "37162" uid: 8df9a447-fd15-465e-8acf-cb810ee78bf4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-05-06T17:07:17Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f9d6558e-5673-45db-94a7-08117f059876"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-05-06T17:07:17Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-05-06T17:43:17Z" name: default-dockercfg-9ntg9 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: f9d6558e-5673-45db-94a7-08117f059876 resourceVersion: "37159" uid: ca12a9d0-a8e0-4c27-9fd6-62ad63361cbe type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-05-06T17:07:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7828390a-3187-4234-b850-986f8047fdb0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-05-06T17:07:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-05-06T17:43:22Z" name: deployer-dockercfg-mvxrl namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 7828390a-3187-4234-b850-986f8047fdb0 resourceVersion: "37336" uid: 75aea263-23e1-44a3-b118-57ae585d1b68 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:faff663ab56f32fcf3c8e71b09603b3355dd9c907938276fa9fbafe66c373412 creationTimestamp: "2026-05-06T17:06:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-05-06T17:06:53Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1908" uid: 48b09ccc-6754-4e9e-8cef-8e0f51f89a11 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-05-05T17:11:11Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: bdad8c57-9a0b-4671-81d6-0bb3a10d0aec service.beta.openshift.io/expiry: "2028-05-05T17:11:11Z" creationTimestamp: "2026-05-06T17:11:11Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"bdad8c57-9a0b-4671-81d6-0bb3a10d0aec"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-05-06T17:11:11Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: bdad8c57-9a0b-4671-81d6-0bb3a10d0aec resourceVersion: "7280" uid: 64f25e60-6f0f-4175-b69b-8d2676bf7892 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-05-06T17:06:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-05-06T17:06:53Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1907" uid: 42042ac7-9f29-44c8-8779-ce2371895dc5 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-05-06T17:06:50Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-05-06T17:06:50Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1644" uid: 0ee7a55b-cef9-41b4-b0b5-7c721f366b93 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-05-06T17:07:17Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"58765d95-9671-41ec-96d2-3bae157d09b0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-05-06T17:07:17Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-05-06T17:43:17Z" name: node-ca-dockercfg-wnmdq namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 58765d95-9671-41ec-96d2-3bae157d09b0 resourceVersion: "37150" uid: ad8f07d6-766c-4fd0-8810-ba556b60ef76 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-05-06T17:07:17Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a5191845-fe4b-4f2e-babd-cd12d7daa4c9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-05-06T17:07:17Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-05-06T17:43:17Z" name: pruner-dockercfg-l6p8t namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: a5191845-fe4b-4f2e-babd-cd12d7daa4c9 resourceVersion: "37164" uid: 9c8a1973-86e0-4297-9c34-0b0a2a85dfd0 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-05-06T17:07:17Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e42fa0cc-68ce-4182-9d48-960e16491c2f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-05-06T17:07:17Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-05-06T17:43:17Z" name: registry-dockercfg-7cpjk namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: e42fa0cc-68ce-4182-9d48-960e16491c2f resourceVersion: "37153" uid: 878d4008-3b16-4f96-82cc-2094e7b2f8cb type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "39877"