--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T17:21:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0d178d61-aa89-4f45-b832-ea775722ab3a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:21:57Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:57:57Z" name: builder-dockercfg-s2sp5 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 0d178d61-aa89-4f45-b832-ea775722ab3a resourceVersion: "26239" uid: 3c7ac7e4-fb01-46e1-b036-ca61eaf12f70 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE4OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-17T17:21:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"678bbe1c-c39f-4aed-8300-358f02f0475a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:21:51Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:57:52Z" name: cluster-image-registry-operator-dockercfg-xs5ch namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 678bbe1c-c39f-4aed-8300-358f02f0475a resourceVersion: "26067" uid: 6317e9a2-b5e6-4a96-a20a-e28cb9f64744 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T17:21:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bbf13ed7-ef85-4a07-b407-fb85e277112b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:21:51Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:57:52Z" name: default-dockercfg-9k2d4 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: bbf13ed7-ef85-4a07-b407-fb85e277112b resourceVersion: "26086" uid: 53affc3c-391f-49f2-9d2b-8c60bfc23050 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T17:21:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c4a49af5-62d6-483c-b090-9b9ada33e239"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:21:57Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:57:57Z" name: deployer-dockercfg-fhb96 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: c4a49af5-62d6-483c-b090-9b9ada33e239 resourceVersion: "26238" uid: 6ea0c4f2-1279-401e-b13e-326ec5e4cea2 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:4e08546afed5788e37d17ff57d9144d04cabb2d7acca7f79b9e28c3b8060ec6b creationTimestamp: "2026-04-17T17:21:26Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T17:21:26Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "2074" uid: 627f732c-17a9-4675-9a14-bd3128f43a72 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T17:25:22Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 6d785a9f-e974-4bed-b208-f901fea7f4e1 service.beta.openshift.io/expiry: "2028-04-16T17:25:22Z" creationTimestamp: "2026-04-17T17:25:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"6d785a9f-e974-4bed-b208-f901fea7f4e1"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T17:25:23Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 6d785a9f-e974-4bed-b208-f901fea7f4e1 resourceVersion: "6875" uid: 69c5f5e6-c0d1-46c9-8db9-eceefe22d96f type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-17T17:21:26Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T17:21:26Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "2073" uid: 8487f569-0056-4d1d-9b23-2d617ff97c18 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-17T17:21:23Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-17T17:21:23Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1694" uid: d63a7777-3176-416b-ab3a-19d6fbd1a0c6 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-17T17:21:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f6a9332f-dc77-4d53-b94d-02207423343c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:21:51Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:57:52Z" name: node-ca-dockercfg-vlcl6 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: f6a9332f-dc77-4d53-b94d-02207423343c resourceVersion: "26078" uid: f8cc7dd2-f4b8-41c6-814f-7c83424c3a50 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-17T17:21:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e02b060d-9f7c-4daa-8f18-f207ac431f39"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:21:51Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:57:52Z" name: pruner-dockercfg-82ssv namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: e02b060d-9f7c-4daa-8f18-f207ac431f39 resourceVersion: "26077" uid: 0f9f844e-6964-4389-9259-9c06451262c7 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-17T17:21:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b4d90461-d7bd-4130-ba07-31071de2d5a4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:21:52Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:57:52Z" name: registry-dockercfg-qvzpk namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: b4d90461-d7bd-4130-ba07-31071de2d5a4 resourceVersion: "26074" uid: d4b1d15e-9906-4d47-95ca-50308ff6106e type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "41936"