--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T13:55:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"70bc2a4c-0646-428f-b075-ef781854fd8e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:55:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:31:32Z" name: builder-dockercfg-tpr8b namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 70bc2a4c-0646-428f-b075-ef781854fd8e resourceVersion: "26267" uid: dccf0efe-c9b9-447b-ae3b-2a1462bd27a0 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-16T13:55:11Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a81716c7-962c-4ec0-88fd-b3ac0ba179ba"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:55:11Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:31:30Z" name: cluster-image-registry-operator-dockercfg-vbl8g namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: a81716c7-962c-4ec0-88fd-b3ac0ba179ba resourceVersion: "26074" uid: 0acd1fd2-6841-46f7-a76c-733823ef7c22 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T13:55:11Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"eecbebea-7552-4631-b82d-c8504557fea5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:55:11Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:31:30Z" name: default-dockercfg-jpl4v namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: eecbebea-7552-4631-b82d-c8504557fea5 resourceVersion: "26043" uid: b91b2035-e233-4030-9170-bd61eda57a63 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T13:55:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1db50592-154f-42f9-ae80-4c362a44eb53"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:55:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:31:32Z" name: deployer-dockercfg-6wzp6 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 1db50592-154f-42f9-ae80-4c362a44eb53 resourceVersion: "26286" uid: 23614196-1f79-4fad-8c7e-b5b6f7cf2fc4 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:1d7e6d6f5f0486331d2a30849bb734ecdd608543cedfad01e543a106aad10077 creationTimestamp: "2026-04-16T13:55:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T13:55:29Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "3718" uid: 6761cabe-3812-491f-ad9e-056ea18f2cd4 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T13:59:54Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 1a625006-f1d4-4e12-bbbd-09d699353717 service.beta.openshift.io/expiry: "2028-04-15T13:59:54Z" creationTimestamp: "2026-04-16T13:59:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"1a625006-f1d4-4e12-bbbd-09d699353717"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T13:59:55Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 1a625006-f1d4-4e12-bbbd-09d699353717 resourceVersion: "7055" uid: 0996da8f-ddda-46a9-83da-835172dce25b type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-16T13:55:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T13:55:29Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "3713" uid: 10580031-0fd0-4078-9b14-27defbf3a6cc type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-16T13:54:52Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-16T13:54:52Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1643" uid: eeef31c9-b2d7-4e41-92f5-f483c408100a type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-16T13:55:11Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"44f656d5-7d5b-471c-965c-c50492de6bb6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:55:11Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:31:30Z" name: node-ca-dockercfg-8vhv7 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 44f656d5-7d5b-471c-965c-c50492de6bb6 resourceVersion: "26035" uid: d1b07241-602c-4a10-9139-d7ccd63a7b6e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-16T13:55:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bdce90e1-be17-4952-8fec-eff87513afab"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:55:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:31:33Z" name: pruner-dockercfg-b4mn2 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: bdce90e1-be17-4952-8fec-eff87513afab resourceVersion: "26302" uid: b7d376f6-60d7-4572-a86f-060b12001d8b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-16T13:55:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"451a0cf0-fd50-43f8-8332-95d59e7583d6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:55:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:31:33Z" name: registry-dockercfg-hnvqt namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 451a0cf0-fd50-43f8-8332-95d59e7583d6 resourceVersion: "26340" uid: 027ebcd7-2921-4711-acac-d8c41df35d9a type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "33201"