--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T13:54:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9a573956-e907-410c-b88a-bb78e1dd002b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:54:58Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:31:24Z" name: builder-dockercfg-2m5ck namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 9a573956-e907-410c-b88a-bb78e1dd002b resourceVersion: "37745" uid: f841fca6-d381-456d-a709-cc9548ed95c4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-16T13:54:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e583e604-7165-45fc-9d6c-b6fbc99d89e5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:54:55Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:31:22Z" name: cluster-image-registry-operator-dockercfg-d5zcf namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: e583e604-7165-45fc-9d6c-b6fbc99d89e5 resourceVersion: "37582" uid: 4f9dc081-fff2-4737-ad3a-abc1bca9bd95 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T13:54:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c8c22ea7-c36e-406a-8267-20223884d03f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:54:55Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:31:22Z" name: default-dockercfg-kntb2 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: c8c22ea7-c36e-406a-8267-20223884d03f resourceVersion: "37641" uid: 34c3b44c-5ef8-484b-b221-2fc250dccc19 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T13:54:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4e0e4394-4714-402c-946f-9e3a6f11c217"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:54:58Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:31:24Z" name: deployer-dockercfg-5xf2x namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 4e0e4394-4714-402c-946f-9e3a6f11c217 resourceVersion: "37724" uid: d6856f04-8932-4d5e-b0b5-11011bfd62a4 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:5907a418bfeb0fa30882de4692354e39f463bdb75b2ad1df98cfd81c480e7255 creationTimestamp: "2026-04-16T13:55:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T13:55:21Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "3977" uid: 313e913c-5425-4cdc-8cb5-ac6b1d80fc55 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T14:00:46Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: a28d729b-3661-4002-8709-782f92587115 service.beta.openshift.io/expiry: "2028-04-15T14:00:46Z" creationTimestamp: "2026-04-16T14:00:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"a28d729b-3661-4002-8709-782f92587115"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T14:00:47Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: a28d729b-3661-4002-8709-782f92587115 resourceVersion: "7649" uid: 4f46a59a-506a-4343-b78e-da6c4f5c51fb type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-16T13:55:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T13:55:21Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "3975" uid: 8ade9466-a03e-4bcd-8935-f7d9e0398196 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-16T13:54:37Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-16T13:54:37Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1700" uid: 5da39bc1-8057-457f-898e-c128441d5ded type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-16T13:54:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c6c37efd-4da1-4390-93a7-3b19e42e15e5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:54:55Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:31:22Z" name: node-ca-dockercfg-d49wl namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: c6c37efd-4da1-4390-93a7-3b19e42e15e5 resourceVersion: "37639" uid: 1cd303e2-dfc9-4d63-b2ca-19701782e539 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-16T13:55:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1eaa61d3-9384-4391-8bfe-92d15943acb5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:55:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:31:25Z" name: pruner-dockercfg-sx9ns namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 1eaa61d3-9384-4391-8bfe-92d15943acb5 resourceVersion: "37799" uid: eb9e6d22-fa62-454a-9540-bcf9ea5a0ffb type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-16T13:55:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3b28abc5-7240-4b72-a1e0-ba94028849e3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:55:21Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:31:25Z" name: registry-dockercfg-khk5g namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 3b28abc5-7240-4b72-a1e0-ba94028849e3 resourceVersion: "37806" uid: c39fa42e-634f-4f9d-87cb-72d2311f4873 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "39837"