--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T11:38:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9d1293a6-229d-4f48-966c-53c453a04d0d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T11:38:52Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T11:38:53Z" name: builder-dockercfg-8k2s5 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 9d1293a6-229d-4f48-966c-53c453a04d0d resourceVersion: "3418" uid: 43458b0d-788b-4aba-b13f-1b727f536e01 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE4OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-20T11:38:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"76d0c4ab-59e5-4cde-be8d-a9f10009012e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T11:38:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T11:38:48Z" name: cluster-image-registry-operator-dockercfg-vct8r namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 76d0c4ab-59e5-4cde-be8d-a9f10009012e resourceVersion: "2840" uid: 4b4cf0ee-c065-4246-93a8-b6ed20f1fc9e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T11:38:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1f697b69-24c9-4cdb-b2a1-4c5c634a2044"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T11:38:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T11:38:48Z" name: default-dockercfg-chlls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 1f697b69-24c9-4cdb-b2a1-4c5c634a2044 resourceVersion: "2841" uid: d0532c2f-cb9d-40d8-b5ce-81430e5646c9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T11:38:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"74852ae9-7a71-4c72-86a0-d4e8d66e3563"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T11:38:52Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T11:38:53Z" name: deployer-dockercfg-k7l9f namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 74852ae9-7a71-4c72-86a0-d4e8d66e3563 resourceVersion: "3419" uid: bcfaa161-0fea-401a-81aa-b51cd6d61ee8 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:0a252b8790b3af89a96686182e85a6ead674e62b9ff32cb6d8e39abc32665a45 creationTimestamp: "2026-04-20T11:38:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-20T11:38:31Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1837" uid: a1c97c37-90b9-451e-80d4-560e1b36166d type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T11:42:43Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 01e1fcaa-4bec-41e6-8bbc-a41dbe90d4b8 service.beta.openshift.io/expiry: "2028-04-19T11:42:43Z" creationTimestamp: "2026-04-20T11:42:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"01e1fcaa-4bec-41e6-8bbc-a41dbe90d4b8"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T11:42:44Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 01e1fcaa-4bec-41e6-8bbc-a41dbe90d4b8 resourceVersion: "6927" uid: e3287ead-c27b-47b3-bc29-86ed6cf999ca type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-20T11:38:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-20T11:38:31Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1836" uid: 440850b0-a327-4ca8-a612-33603ac08b47 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-20T11:38:29Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-20T11:38:29Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1669" uid: 81aa7530-44da-485f-ac9e-19b1111247a5 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-20T11:38:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9e02e76c-54a0-4992-b122-f5705464d65a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T11:38:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T11:38:48Z" name: node-ca-dockercfg-ttmbb namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 9e02e76c-54a0-4992-b122-f5705464d65a resourceVersion: "2847" uid: 0e854ad1-449e-4b06-b171-a4b9012d6afa type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-20T11:38:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T11:38:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"505e6447-f2cb-4974-9a1e-5245a7ad0899"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T11:38:48Z" name: pruner-dockercfg-jmbrl namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 505e6447-f2cb-4974-9a1e-5245a7ad0899 resourceVersion: "2855" uid: 4e959761-74b8-4d45-80a6-5b749209cbf0 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-20T11:38:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T11:38:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ea170cff-0f53-4b49-b206-0ce1ab6b9917"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T11:38:48Z" name: registry-dockercfg-jqbrx namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: ea170cff-0f53-4b49-b206-0ce1ab6b9917 resourceVersion: "2856" uid: ff94db13-eeab-4d25-aa93-c297b478daa3 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "10851"