--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T18:13:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:13:06Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ddc484bf-e12f-4072-86d6-19ecbe38cf09"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:13:06Z" name: builder-dockercfg-ztjrf namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: ddc484bf-e12f-4072-86d6-19ecbe38cf09 resourceVersion: "3673" uid: 910f0e14-daae-4175-95b5-97774debd092 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-16T18:13:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:13:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7983fc3a-730f-4428-95a4-f4c60c020a80"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:13:01Z" name: cluster-image-registry-operator-dockercfg-c7z2z namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 7983fc3a-730f-4428-95a4-f4c60c020a80 resourceVersion: "3026" uid: a7f558c5-d7f2-4af2-8b80-1ac2c8df0bb9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T18:13:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:13:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"eb9b4260-b7b5-4633-ba53-5d0e04c71e0c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:13:01Z" name: default-dockercfg-zcq9z namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: eb9b4260-b7b5-4633-ba53-5d0e04c71e0c resourceVersion: "3027" uid: 076ade30-7a85-4765-a8e8-08458891aaad type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T18:13:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:13:06Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"747118ac-5ca3-4bfe-95ea-4c346416752d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:13:06Z" name: deployer-dockercfg-pxztg namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 747118ac-5ca3-4bfe-95ea-4c346416752d resourceVersion: "3680" uid: 294fbfa9-9011-42d3-9d0e-b1b0973e6b56 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:327ea261c69585093783ba6e2072eb9ec7dcf3b621a956835609517ee76053f4 creationTimestamp: "2026-04-16T18:12:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T18:12:43Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1882" uid: 0dfc8f87-9fe6-46e6-8620-eeefa81e7786 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T18:18:57Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: e64f1bf0-461d-4da4-8bef-7b8e828dfed0 service.beta.openshift.io/expiry: "2028-04-15T18:18:57Z" creationTimestamp: "2026-04-16T18:18:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"e64f1bf0-461d-4da4-8bef-7b8e828dfed0"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T18:18:58Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: e64f1bf0-461d-4da4-8bef-7b8e828dfed0 resourceVersion: "7811" uid: 8a2ca7b4-96cf-4ad7-854d-3016d6416f4d type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-16T18:12:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T18:12:43Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1881" uid: e9ad5831-6ba0-4c4c-b0da-86efceac522a type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-16T18:12:40Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-16T18:12:40Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1703" uid: 472f62e9-9644-4ed9-80cb-7ae46d65cb54 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-16T18:13:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:13:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f1d6ab5a-ad6a-4118-9bfd-c42530cef37f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:13:01Z" name: node-ca-dockercfg-w7mkd namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: f1d6ab5a-ad6a-4118-9bfd-c42530cef37f resourceVersion: "3034" uid: 5bdaa683-a93b-4986-9325-98e71723ea58 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-16T18:13:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:13:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9ed4f6bc-f1e2-4960-975c-3ba0a387a37f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:13:01Z" name: pruner-dockercfg-qbbbz namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 9ed4f6bc-f1e2-4960-975c-3ba0a387a37f resourceVersion: "3033" uid: 096920ae-8a7e-47ab-98ec-4c28e55a66f2 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-16T18:13:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:13:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5e80eaec-99d0-4691-9db4-0932b5062aa1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:13:01Z" name: registry-dockercfg-qqz6d namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 5e80eaec-99d0-4691-9db4-0932b5062aa1 resourceVersion: "3036" uid: 774afde2-dfac-44ce-ae67-67bd2aa45957 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21411"