--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-21T10:00:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"68dad252-fe41-46f6-ab9f-cadf768e1110"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T10:00:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T10:36:08Z" name: builder-dockercfg-4d2wc namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 68dad252-fe41-46f6-ab9f-cadf768e1110 resourceVersion: "26306" uid: 26563b8e-81cf-4c33-b405-8942a4380e4f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE4OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-21T10:00:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"125d7bdb-6e72-486d-8b4f-a5f9d3422795"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T10:00:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T10:36:03Z" name: cluster-image-registry-operator-dockercfg-g9v6b namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 125d7bdb-6e72-486d-8b4f-a5f9d3422795 resourceVersion: "26132" uid: b16a3e08-fe89-496c-8140-52f08166ed20 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-21T10:00:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9366d6bc-2497-4c01-84cb-38284aab7470"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T10:00:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T10:36:04Z" name: default-dockercfg-7hzzw namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 9366d6bc-2497-4c01-84cb-38284aab7470 resourceVersion: "26179" uid: e0fb67c8-8332-443a-8cd0-ca6e3c52ccc1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-21T10:00:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e063155c-d252-4a85-9d3c-4229ca522ffb"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T10:00:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T10:36:08Z" name: deployer-dockercfg-d875h namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: e063155c-d252-4a85-9d3c-4229ca522ffb resourceVersion: "26305" uid: 58df5a54-6cac-40a2-bbfd-e07695be6d77 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a3a73374b0205fa5530bc92b260f44b85b41e953b2e6445a7299a50ed4d41170 creationTimestamp: "2026-04-21T09:59:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-21T09:59:52Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1883" uid: 50186247-4ad1-47c9-a3d4-8e5940186d81 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T10:04:25Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 85f653b1-e2f8-4212-b43f-40f3d62279f2 service.beta.openshift.io/expiry: "2028-04-20T10:04:25Z" creationTimestamp: "2026-04-21T10:04:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"85f653b1-e2f8-4212-b43f-40f3d62279f2"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T10:04:25Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 85f653b1-e2f8-4212-b43f-40f3d62279f2 resourceVersion: "7150" uid: b7dd5e3c-a070-47b4-9206-9df178a27cc2 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-21T09:59:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-21T09:59:52Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1882" uid: 704bd82d-b25c-47a5-a3e0-4bd7f4f55526 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-21T09:59:46Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-21T09:59:46Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1568" uid: 7259fbf8-1e26-46fb-9460-5d0afaf54567 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-21T10:00:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"19768d0b-8bfb-4869-829f-99635a740e41"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T10:00:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T10:36:04Z" name: node-ca-dockercfg-pgq9t namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 19768d0b-8bfb-4869-829f-99635a740e41 resourceVersion: "26187" uid: cc21aa81-2c7f-48ea-aa3b-133936b46e0f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-21T10:00:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2e05ad0e-8f11-4a67-8a0c-abc76f258ca7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T10:00:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T10:36:04Z" name: pruner-dockercfg-sbxcr namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 2e05ad0e-8f11-4a67-8a0c-abc76f258ca7 resourceVersion: "26186" uid: 164cb41f-c6a6-48ea-8a62-892e5472758b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-21T10:00:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8c7cf7ea-ccbb-404f-ae4e-8c57878a50f2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T10:00:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T10:36:04Z" name: registry-dockercfg-qvkrb namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 8c7cf7ea-ccbb-404f-ae4e-8c57878a50f2 resourceVersion: "26201" uid: aae9d4e1-39f2-4093-b592-9acd08f57021 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "33094"