--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-21T10:00:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T10:00:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b44ce53b-05cf-4159-b4e0-e4d26716afc7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T10:00:32Z" name: builder-dockercfg-x8q47 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: b44ce53b-05cf-4159-b4e0-e4d26716afc7 resourceVersion: "3971" uid: fd1ecda5-9382-4db8-a717-e7dbb0018484 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE4OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-21T10:00:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T10:00:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a74acfc4-b42b-4c9e-a9d5-a7006562d72c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T10:00:27Z" name: cluster-image-registry-operator-dockercfg-vxq4h namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: a74acfc4-b42b-4c9e-a9d5-a7006562d72c resourceVersion: "3378" uid: 6d02f1a8-8c74-4ef9-8cf9-bc64e84218e7 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-21T10:00:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T10:00:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"79b54f3c-c528-4e4d-80b0-daab26e8709f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T10:00:27Z" name: default-dockercfg-qdxnc namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 79b54f3c-c528-4e4d-80b0-daab26e8709f resourceVersion: "3387" uid: b47883c5-7c9d-40e5-b67b-cec4ebc95a5f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-21T10:00:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T10:00:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"39787733-932b-4e00-b6e8-9c4146096be7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T10:00:32Z" name: deployer-dockercfg-wjq98 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 39787733-932b-4e00-b6e8-9c4146096be7 resourceVersion: "3976" uid: e0f20fff-aeac-44ce-9712-0388f5a5400e type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:9a175ec79a31fef6b54f82b8f41da9cd96b000e5843a755b215bea34fa7dc3f2 creationTimestamp: "2026-04-21T09:59:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-21T09:59:42Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1872" uid: c9bfca88-8639-4040-9100-a66c91e86dda type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T10:06:24Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 2f075939-30a5-4258-9691-0987e94e2fd0 service.beta.openshift.io/expiry: "2028-04-20T10:06:24Z" creationTimestamp: "2026-04-21T10:06:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"2f075939-30a5-4258-9691-0987e94e2fd0"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T10:06:25Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 2f075939-30a5-4258-9691-0987e94e2fd0 resourceVersion: "7953" uid: 94c97b46-ee77-4458-8022-a9b3631275a3 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-21T09:59:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-21T09:59:42Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1870" uid: afe1de10-ee78-45a3-b89f-e43e1f626114 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-21T09:59:40Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-21T09:59:40Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1758" uid: c8c8b189-5f82-4aaf-b0c2-f4b18deb145d type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-21T10:00:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T10:00:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1f5514d1-3f4f-48dd-a418-09cec6926277"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T10:00:27Z" name: node-ca-dockercfg-27kw6 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 1f5514d1-3f4f-48dd-a418-09cec6926277 resourceVersion: "3381" uid: c99ccf8b-50d7-4c2a-b8b1-f437d9e2372b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-21T10:00:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T10:00:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bbd406d2-2763-4cc6-adae-70aff2ad0e18"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T10:00:27Z" name: pruner-dockercfg-g8cc6 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: bbd406d2-2763-4cc6-adae-70aff2ad0e18 resourceVersion: "3393" uid: f1410d53-2e20-4379-91f0-be899f77e896 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-21T10:00:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T10:00:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"78d896d9-7786-4d3c-a15b-07c508a8a249"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T10:00:27Z" name: registry-dockercfg-nljzt namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 78d896d9-7786-4d3c-a15b-07c508a8a249 resourceVersion: "3396" uid: 93a61169-7260-407e-adc3-54b17144a2ce type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "25090"