--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-21T07:08:19Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"64fe064d-670c-4865-8d63-0c8f15889415"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T07:08:19Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T07:08:20Z" name: builder-dockercfg-n4glj namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 64fe064d-670c-4865-8d63-0c8f15889415 resourceVersion: "3998" uid: dc4952d1-31d4-4128-b8b3-70c576dd1ef0 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE4OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-21T07:08:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T07:08:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"622f1804-938c-41ad-8fd5-f2a130d5b3ef"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T07:08:14Z" name: cluster-image-registry-operator-dockercfg-fctfm namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 622f1804-938c-41ad-8fd5-f2a130d5b3ef resourceVersion: "3323" uid: b9a91863-02f5-447f-9338-1bba80113884 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-21T07:08:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T07:08:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4be52eb4-55cd-4117-be08-efdb0dfad8d5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T07:08:14Z" name: default-dockercfg-lbk2m namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 4be52eb4-55cd-4117-be08-efdb0dfad8d5 resourceVersion: "3331" uid: c3de9598-c493-48a7-a765-e168606a5d66 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-21T07:08:19Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f696d7e1-e816-418c-96cb-fefe727a9f3a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T07:08:19Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T07:08:20Z" name: deployer-dockercfg-nl7pb namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: f696d7e1-e816-418c-96cb-fefe727a9f3a resourceVersion: "3997" uid: d3686a8a-5e50-4d19-bc7a-b640c5ff7013 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:7797d317d31c44a0a9c4be28310bd6b122a4b4b1a238ce92900def9fcbce46ce creationTimestamp: "2026-04-21T07:07:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-21T07:07:42Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1905" uid: 0d9ce497-ca0a-46df-bf83-4356a33ee3b0 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T07:11:55Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 1e8a1894-95f5-4115-bf9e-e982fccc7204 service.beta.openshift.io/expiry: "2028-04-20T07:11:55Z" creationTimestamp: "2026-04-21T07:11:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"1e8a1894-95f5-4115-bf9e-e982fccc7204"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T07:11:56Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 1e8a1894-95f5-4115-bf9e-e982fccc7204 resourceVersion: "7285" uid: 1013012b-868e-48f0-ae57-9e29dc69b0ee type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-21T07:07:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-21T07:07:42Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1903" uid: d7bf63b1-7f9e-4ba8-81b8-176f6791f894 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-21T07:07:39Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-21T07:07:39Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1676" uid: 24475f89-d127-4257-82ad-03eed9433e1a type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-21T07:08:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T07:08:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1212076e-8c19-413b-a9f4-b50998a97b96"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T07:08:14Z" name: node-ca-dockercfg-qpdtf namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 1212076e-8c19-413b-a9f4-b50998a97b96 resourceVersion: "3332" uid: a73a964f-9476-4180-b9bf-7025bcc55cf2 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-21T07:08:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T07:08:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5713d8f8-8476-4e15-908b-1decc279c2ec"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T07:08:14Z" name: pruner-dockercfg-xmhj9 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 5713d8f8-8476-4e15-908b-1decc279c2ec resourceVersion: "3333" uid: e8267b15-a5b9-4bd4-91af-db7d46913248 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-21T07:08:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T07:08:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"aaf15f74-b5c2-4005-82b9-156bdadfecc6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T07:08:14Z" name: registry-dockercfg-sgb5p namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: aaf15f74-b5c2-4005-82b9-156bdadfecc6 resourceVersion: "3343" uid: cb003d52-7515-4e36-8c1a-e9adbe15033a type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "10884"