--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-28T19:13:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"819ba38b-6dc4-484a-b169-406a14c25b0e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-28T19:13:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-28T19:49:16Z" name: builder-dockercfg-rxwr4 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 819ba38b-6dc4-484a-b169-406a14c25b0e resourceVersion: "36151" uid: 8811cfb9-f752-4516-83bd-0416a0813cf3 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE4OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-28T19:13:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8a2c371e-bc1a-4955-b92d-52b53c2ba400"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-28T19:13:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-28T19:49:10Z" name: cluster-image-registry-operator-dockercfg-9kj82 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 8a2c371e-bc1a-4955-b92d-52b53c2ba400 resourceVersion: "35874" uid: 03cc1bef-6d18-4c7f-bae5-0f7fff06d564 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-28T19:13:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"98fc9c3d-706c-4287-8c7a-b5bcdbd5801a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-28T19:13:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-28T19:49:10Z" name: default-dockercfg-jjgpx namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 98fc9c3d-706c-4287-8c7a-b5bcdbd5801a resourceVersion: "35868" uid: 6bad6224-510e-4c62-a53f-9844434e9535 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-28T19:13:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cc3bb347-07a3-4fa2-8243-f2058d3b5649"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-28T19:13:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-28T19:49:16Z" name: deployer-dockercfg-7tzw5 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: cc3bb347-07a3-4fa2-8243-f2058d3b5649 resourceVersion: "36171" uid: 734108f9-9156-4e8d-bc97-34dde85d5fec type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:474f36e2102cc3550a7900bb6e93807ed61898fc69d37e8198c778dd45248f29 creationTimestamp: "2026-04-28T19:12:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-28T19:12:15Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1879" uid: bc654b54-488f-46bd-933b-c5c3a2a16d43 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-27T19:16:35Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 9c852ef1-1b05-4dae-8f18-08fada28a8ea service.beta.openshift.io/expiry: "2028-04-27T19:16:35Z" creationTimestamp: "2026-04-28T19:16:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"9c852ef1-1b05-4dae-8f18-08fada28a8ea"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-28T19:16:36Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 9c852ef1-1b05-4dae-8f18-08fada28a8ea resourceVersion: "6701" uid: cb16464b-6361-4265-9bf3-abd679429fb7 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-28T19:12:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-28T19:12:15Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1878" uid: 1dd1d721-df9e-4856-bb6b-b8e2d9dc4320 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-28T19:12:13Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-28T19:12:13Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1790" uid: b0d65827-ca16-42e8-8baa-70fd8cb8de5f type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-28T19:13:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a21141d9-887c-4cb3-a642-54e82fa6c348"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-28T19:13:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-28T19:49:10Z" name: node-ca-dockercfg-k9gmt namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: a21141d9-887c-4cb3-a642-54e82fa6c348 resourceVersion: "35862" uid: 7b28a697-8414-48a5-bcae-407fcd3c2b5f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-28T19:13:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"610a3188-bd26-4469-bfcf-a7579f838b83"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-28T19:13:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-28T19:49:10Z" name: pruner-dockercfg-czbrf namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 610a3188-bd26-4469-bfcf-a7579f838b83 resourceVersion: "35875" uid: 43d3f15a-ae3d-4fe6-82cb-b2dc62daa7cf type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-28T19:13:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c2b1766b-6b4d-47ee-9131-f05351d9d8b2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-28T19:13:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-28T19:49:10Z" name: registry-dockercfg-b9m64 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: c2b1766b-6b4d-47ee-9131-f05351d9d8b2 resourceVersion: "35864" uid: bf0f444f-8078-49d1-aee5-10d2796d6be5 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "64149"