--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-03-18T09:04:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"260dd229-2f0d-4877-b201-84f41684a437"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T09:04:16Z" name: builder-dockercfg-6w9xc namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 260dd229-2f0d-4877-b201-84f41684a437 resourceVersion: "13603" uid: c87048a7-38a4-423b-b0fc-6db515a13631 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-03-18T09:04:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"85c127ac-5c7e-42af-9aab-f33aa2ebc3bb"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T09:04:21Z" name: cluster-image-registry-operator-dockercfg-q7dg9 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 85c127ac-5c7e-42af-9aab-f33aa2ebc3bb resourceVersion: "14059" uid: ca65b892-77f0-4309-a780-4a18228bea82 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-03-18T09:04:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6c29f88d-b2a2-44cb-8fd7-5875510df534"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T09:04:25Z" name: default-dockercfg-v879p namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 6c29f88d-b2a2-44cb-8fd7-5875510df534 resourceVersion: "14403" uid: 25790bf4-10b6-4577-ba2d-09c22940fb9e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-03-18T09:04:26Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8c47b401-f8f8-4864-8773-4d67d2a31a30"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T09:04:26Z" name: deployer-dockercfg-gqjc4 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 8c47b401-f8f8-4864-8773-4d67d2a31a30 resourceVersion: "14498" uid: 1a62c38c-2ff5-49a6-a9bc-13343f041cc3 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry-operator with hostname image-registry-operator.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-operator-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-03-17T08:48:48Z" service.alpha.openshift.io/originating-service-name: image-registry-operator service.alpha.openshift.io/originating-service-uid: 2b8480c2-74f5-4cd3-8edd-e5ef2783dec7 service.beta.openshift.io/expiry: "2028-03-17T08:48:48Z" creationTimestamp: "2026-03-18T08:48:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"2b8480c2-74f5-4cd3-8edd-e5ef2783dec7"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-03-18T08:48:49Z" name: image-registry-operator-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry-operator uid: 2b8480c2-74f5-4cd3-8edd-e5ef2783dec7 resourceVersion: "5824" uid: 9f619bf5-a279-44e7-92b7-f96dbee23343 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-03-18T09:04:19Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5ff9af6a-44e7-4c6c-9b22-dcf0f69b5584"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T09:04:19Z" name: node-ca-dockercfg-qwxs4 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 5ff9af6a-44e7-4c6c-9b22-dcf0f69b5584 resourceVersion: "13905" uid: 22d469ea-52a3-47b1-bf18-7c6af80c8d9a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-03-18T09:04:19Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6e3b91ce-10c0-4630-99b1-15dcd6b818e3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T09:04:19Z" name: pruner-dockercfg-fsv5h namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 6e3b91ce-10c0-4630-99b1-15dcd6b818e3 resourceVersion: "13956" uid: 31319c6a-bb2f-406a-873b-1c1c47030ab5 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "18942"