--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T14:49:19Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"34b37836-7f8d-4dc9-8dd1-1069f69f0b64"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:19Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:19Z" name: builder-dockercfg-2qctm namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 34b37836-7f8d-4dc9-8dd1-1069f69f0b64 resourceVersion: "24243" uid: 3f36ecc8-4c26-4f3c-926a-86053408f1ce type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE4OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-16T14:49:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"20a49210-eda6-43a3-9c79-9c6dc28b8bba"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:14Z" name: cluster-image-registry-operator-dockercfg-gkmwx namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 20a49210-eda6-43a3-9c79-9c6dc28b8bba resourceVersion: "24069" uid: c5d6d60a-82d5-4851-96b0-87a8cad52f28 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T14:49:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c5c46c44-a759-48e1-b968-f954c39fec2b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:15Z" name: default-dockercfg-8bwcq namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: c5c46c44-a759-48e1-b968-f954c39fec2b resourceVersion: "24127" uid: 89e1ab9a-9bce-4964-94d0-02af86195019 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T14:49:19Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5982db3d-d3c9-4264-a0f9-df1e41971537"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:19Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:19Z" name: deployer-dockercfg-bp6fp namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 5982db3d-d3c9-4264-a0f9-df1e41971537 resourceVersion: "24259" uid: 3e6f82cf-965d-47bf-aee4-9e377e2273a4 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:515b452c0578831bbc51b88293dd7244658512f794db628af4f3106105801ad1 creationTimestamp: "2026-04-16T14:49:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T14:49:02Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1957" uid: 167c2fb4-2047-483b-ab99-eb36392dad37 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T14:55:12Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: ca83f98a-ef0d-434b-898c-f449f552184e service.beta.openshift.io/expiry: "2028-04-15T14:55:12Z" creationTimestamp: "2026-04-16T14:55:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"ca83f98a-ef0d-434b-898c-f449f552184e"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T14:55:13Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: ca83f98a-ef0d-434b-898c-f449f552184e resourceVersion: "7739" uid: 553e70c3-89e1-4163-9549-900e3c637ac6 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-16T14:49:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T14:49:02Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1955" uid: 62531f22-45db-46bf-ba62-f4f4d1190f0d type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-16T14:48:59Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-16T14:48:59Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1821" uid: 852e0b0a-da18-40a5-a375-f8553cb87687 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-16T14:49:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7f7ea8e3-4dd6-4e5a-a393-d8a44373484b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:15Z" name: node-ca-dockercfg-r2ffp namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 7f7ea8e3-4dd6-4e5a-a393-d8a44373484b resourceVersion: "24105" uid: 34303624-1bef-4fe6-846b-35c5b2cfff8a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-16T14:49:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"04fc8833-c95e-4ad9-918b-e05c88cb04de"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:15Z" name: pruner-dockercfg-cxxj6 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 04fc8833-c95e-4ad9-918b-e05c88cb04de resourceVersion: "24113" uid: bffd1e20-9fb1-4fcb-a23a-977ee1689c99 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-16T14:49:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9688d103-e08e-4ba1-8a8e-3bd0bc2a0da4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:15Z" name: registry-dockercfg-hzw2z namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 9688d103-e08e-4ba1-8a8e-3bd0bc2a0da4 resourceVersion: "24107" uid: 387b3a2d-3928-4665-aab6-3b88bb482c45 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "42536"