--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T18:26:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"03c7c911-c3f1-4401-89cd-c693876a5b43"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:26:52Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:26:53Z" name: builder-dockercfg-tg6w2 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 03c7c911-c3f1-4401-89cd-c693876a5b43 resourceVersion: "3262" uid: d4d7845a-0dad-41f4-8643-b308c31a8c2a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE4OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-16T18:26:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:26:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b9639d14-1e96-4014-adb3-9558f2b614ad"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:26:48Z" name: cluster-image-registry-operator-dockercfg-pkpnv namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: b9639d14-1e96-4014-adb3-9558f2b614ad resourceVersion: "2678" uid: 06329a5b-9b6a-480c-8476-bc540886a7a4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T18:26:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:26:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4ab96111-964e-4801-9f73-e7a638dd38f5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:26:48Z" name: default-dockercfg-5jwnm namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 4ab96111-964e-4801-9f73-e7a638dd38f5 resourceVersion: "2679" uid: a12b98e5-7adf-422d-9a41-ec3acb40d78e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T18:26:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3c830027-d4ed-474c-afb3-112c4f9d7571"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:26:52Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:26:53Z" name: deployer-dockercfg-28kjm namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 3c830027-d4ed-474c-afb3-112c4f9d7571 resourceVersion: "3264" uid: 921d222e-c063-4ab2-b05d-0bbf3c4ea116 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:5ca777f354109baf39807e74e113dd22a7650bee99368e372306bdddd2a5758f creationTimestamp: "2026-04-16T18:26:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T18:26:35Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1876" uid: decd3119-0b60-4f71-b06a-06b1ffaf6513 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T18:31:15Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: f9149cec-be64-4a2e-9e8a-dabac9cce68d service.beta.openshift.io/expiry: "2028-04-15T18:31:15Z" creationTimestamp: "2026-04-16T18:31:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"f9149cec-be64-4a2e-9e8a-dabac9cce68d"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T18:31:16Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: f9149cec-be64-4a2e-9e8a-dabac9cce68d resourceVersion: "6826" uid: 58d466d9-f33b-4b58-82a7-787afcddaa9b type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-16T18:26:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T18:26:35Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1874" uid: de92d507-f4aa-4021-871f-211a331a5065 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-16T18:26:33Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-16T18:26:33Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1757" uid: 2bb49a2e-d085-42ab-8632-3e56567f3875 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-16T18:26:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:26:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"66ac163d-4521-4d50-b074-5e5da4d0d29e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:26:48Z" name: node-ca-dockercfg-9rx88 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 66ac163d-4521-4d50-b074-5e5da4d0d29e resourceVersion: "2680" uid: f237352b-c467-4330-b2f5-95ea714628d0 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-16T18:26:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:26:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"895bbf32-8488-437b-950f-b03b67c5f550"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:26:48Z" name: pruner-dockercfg-blfgn namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 895bbf32-8488-437b-950f-b03b67c5f550 resourceVersion: "2702" uid: 62256d98-0cad-4e75-8ea3-4459b15f931e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-16T18:26:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:26:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"307ce873-fcf3-43a7-abe5-d1ebf9c927cb"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:26:48Z" name: registry-dockercfg-p5mxf namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 307ce873-fcf3-43a7-abe5-d1ebf9c927cb resourceVersion: "2704" uid: ac5773e4-44ae-4839-bc0c-8140aa96f73c type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "37444"