--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T18:12:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"dae8a8aa-b63b-4ba6-ade1-9aafcfe4125d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:12:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:12:21Z" name: builder-dockercfg-zfl64 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: dae8a8aa-b63b-4ba6-ade1-9aafcfe4125d resourceVersion: "3735" uid: 0e34cf56-0123-4956-ba16-c2091346fdab type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-16T18:12:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:12:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cdeb56e3-bab0-42c9-9e76-5ee6f5153ca9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:12:15Z" name: cluster-image-registry-operator-dockercfg-xhxms namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: cdeb56e3-bab0-42c9-9e76-5ee6f5153ca9 resourceVersion: "2968" uid: f70a1ca3-ce45-4905-b47d-2773efae8a77 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T18:12:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:12:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5c31ddfa-3af3-4e18-847c-f741a052c156"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:12:15Z" name: default-dockercfg-bpf5h namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 5c31ddfa-3af3-4e18-847c-f741a052c156 resourceVersion: "2970" uid: d74ca389-3e0c-435f-bd4b-7173cb7c9111 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T18:12:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e5bc1829-ba65-4583-8922-9689abf53fcd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:12:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:12:21Z" name: deployer-dockercfg-m8lmd namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: e5bc1829-ba65-4583-8922-9689abf53fcd resourceVersion: "3734" uid: 360034d8-2118-4c06-b3f1-368f1ee901ab type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:ffe695ef4c4817635ea55c5b4cf016d5e430d9a9a2a9dd54ada75fa4de852e31 creationTimestamp: "2026-04-16T18:11:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T18:11:51Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1968" uid: 5b6c73fd-95f7-45bb-9401-3cad0747ee49 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T18:18:09Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: e65abfa1-4a24-4feb-a171-7e477e55607d service.beta.openshift.io/expiry: "2028-04-15T18:18:09Z" creationTimestamp: "2026-04-16T18:18:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"e65abfa1-4a24-4feb-a171-7e477e55607d"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T18:18:10Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: e65abfa1-4a24-4feb-a171-7e477e55607d resourceVersion: "7790" uid: 8562b675-f234-4918-bd1c-083da0e73bb7 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-16T18:11:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T18:11:51Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1965" uid: fe1716ff-977a-4c10-840d-8ce9c5ad2dbb type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-16T18:11:48Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-16T18:11:48Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1717" uid: a42e27e7-bdbc-4576-83ba-a103003e57d6 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-16T18:12:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:12:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d8b21e90-3ac1-4902-8a64-f38f379d75c9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:12:15Z" name: node-ca-dockercfg-q9cpn namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: d8b21e90-3ac1-4902-8a64-f38f379d75c9 resourceVersion: "2971" uid: f3b9ec81-e108-4ecc-9652-2c1d59d1eed5 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-16T18:12:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a80cfff8-043f-4f50-a104-5ac766939c18"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:12:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:12:16Z" name: pruner-dockercfg-lk58n namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: a80cfff8-043f-4f50-a104-5ac766939c18 resourceVersion: "2975" uid: 21a523b2-5220-492c-a177-ecdb2d8ddc2e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-16T18:12:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1b60b39c-8f7d-4606-9622-08b03a8d60ac"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:12:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:12:16Z" name: registry-dockercfg-846cr namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 1b60b39c-8f7d-4606-9622-08b03a8d60ac resourceVersion: "2983" uid: e37db52f-2201-49b7-9323-7838e369bfed type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "23787"