--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-05-11T20:47:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1e0d89ae-e50c-42a8-9699-5026ad148448"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-05-11T20:47:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-05-11T21:23:09Z" name: builder-dockercfg-x97pk namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 1e0d89ae-e50c-42a8-9699-5026ad148448 resourceVersion: "45334" uid: f3d66e02-6707-476d-b546-d6fb7c4a9ca9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-05-11T20:47:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b666808b-d3e6-4d04-8e31-812ffd686a6f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-05-11T20:47:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-05-11T21:23:03Z" name: cluster-image-registry-operator-dockercfg-bczlh namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: b666808b-d3e6-4d04-8e31-812ffd686a6f resourceVersion: "45095" uid: 095bb2ea-aec1-4f28-8c25-d0955de303e9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-05-11T20:47:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d3853783-4bc1-49d8-a02a-c62f775c240b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-05-11T20:47:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-05-11T21:23:03Z" name: default-dockercfg-8kqm8 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: d3853783-4bc1-49d8-a02a-c62f775c240b resourceVersion: "45106" uid: 0adf988e-b2ae-4462-be89-17de9c60ccc3 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-05-11T20:47:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0cdd264c-9a03-4114-8bb9-19d5e6e8371e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-05-11T20:47:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-05-11T21:23:09Z" name: deployer-dockercfg-ckx7f namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 0cdd264c-9a03-4114-8bb9-19d5e6e8371e resourceVersion: "45336" uid: 2ba55254-1a9a-4055-8005-1a408edd7f42 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:e62ab3eba5bff40dee7cbbc8117dfc6a11e28756a834d7a11e223ae5fad70a22 creationTimestamp: "2026-05-11T20:46:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-05-11T20:46:43Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1860" uid: 5a058948-8723-4a65-a401-63dec82c227b type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-05-10T20:51:09Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: c64793f7-e744-4ac7-8328-b9fc25ece03b service.beta.openshift.io/expiry: "2028-05-10T20:51:09Z" creationTimestamp: "2026-05-11T20:51:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"c64793f7-e744-4ac7-8328-b9fc25ece03b"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-05-11T20:51:10Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: c64793f7-e744-4ac7-8328-b9fc25ece03b resourceVersion: "7133" uid: b7a197df-f658-4c34-83a6-9c672fad9d7b type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-05-11T20:46:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-05-11T20:46:43Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1857" uid: bb4e6382-1556-4e7f-80de-cb54d67e0550 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-05-11T20:46:41Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-05-11T20:46:41Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1671" uid: 8af90094-1c5e-4024-adc7-e6ba847f50d5 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-05-11T20:47:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2411069b-ecbd-4ce0-b070-96077bd31c4d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-05-11T20:47:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-05-11T21:23:03Z" name: node-ca-dockercfg-wr8jp namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 2411069b-ecbd-4ce0-b070-96077bd31c4d resourceVersion: "45100" uid: 5763d5d3-1df4-4ec6-b464-aedb173e18ed type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-05-11T20:47:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5112d1eb-3286-4cfb-968c-670dd5cc72bf"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-05-11T20:47:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-05-11T21:23:03Z" name: pruner-dockercfg-h9k46 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 5112d1eb-3286-4cfb-968c-670dd5cc72bf resourceVersion: "45110" uid: 0f1247e4-b693-49a5-8ebf-89dffbd5a823 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-05-11T20:47:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b7d3507c-8a36-48d6-99d1-eb13613be99c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-05-11T20:47:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-05-11T21:23:03Z" name: registry-dockercfg-6vnrf namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: b7d3507c-8a36-48d6-99d1-eb13613be99c resourceVersion: "45091" uid: 5e2c7902-87ee-4567-8efb-a60952bd696c type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "46234"