--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T17:31:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2c7dd79b-2ccf-4a5a-84e1-cd4fa7361c06"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:31:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:07:08Z" name: builder-dockercfg-rw6wv namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 2c7dd79b-2ccf-4a5a-84e1-cd4fa7361c06 resourceVersion: "38272" uid: a47645a6-2295-4e90-ab44-5ba5b68cfcd9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-22T17:31:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"84baf5d7-9357-4d54-8a23-fd7ea53f6014"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:31:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:07:03Z" name: cluster-image-registry-operator-dockercfg-59m8r namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 84baf5d7-9357-4d54-8a23-fd7ea53f6014 resourceVersion: "38092" uid: 071d5a91-a2c5-4976-9e79-8036c0d1350b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T17:31:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bb529c24-8c51-443e-b14c-e5c3c4df5e5f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:31:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:07:03Z" name: default-dockercfg-v9lww namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: bb529c24-8c51-443e-b14c-e5c3c4df5e5f resourceVersion: "38088" uid: b5a99cd4-5418-4548-859a-530c32ce7fa2 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T17:31:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fc5c77de-7239-4914-902b-5513f81331e3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:31:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:07:08Z" name: deployer-dockercfg-tfl2p namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: fc5c77de-7239-4914-902b-5513f81331e3 resourceVersion: "38257" uid: 4a99e95f-726d-4d78-b52e-fe524d443821 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:1fdc783b272e260dd3b040b9a33039ce982f3eb181e31e56a2a3ca09d4c52ebf creationTimestamp: "2026-04-22T17:30:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T17:30:33Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1979" uid: 187fb156-0194-489c-a868-f4e53a02a274 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T17:36:44Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 0be411a5-8457-4e94-8d51-65d286be66da service.beta.openshift.io/expiry: "2028-04-21T17:36:44Z" creationTimestamp: "2026-04-22T17:36:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"0be411a5-8457-4e94-8d51-65d286be66da"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T17:36:45Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 0be411a5-8457-4e94-8d51-65d286be66da resourceVersion: "7752" uid: b28cc845-f747-47a4-8378-12afa8d531e4 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-22T17:30:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T17:30:33Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1978" uid: 333eca35-b9cd-42e5-991d-f692e6cbc84a type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-22T17:30:30Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-22T17:30:30Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1704" uid: 71b24433-842e-4cc5-b571-237d85d64773 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-22T17:31:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6ab4f56b-c222-44b4-949c-291e50cf808f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:31:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:07:03Z" name: node-ca-dockercfg-sfkpl namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 6ab4f56b-c222-44b4-949c-291e50cf808f resourceVersion: "38082" uid: d3e01834-43e3-4724-871e-540e8ebadec3 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-22T17:31:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0a5a3f79-a93b-4f0b-9b43-f4f94215d1a3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:31:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:07:03Z" name: pruner-dockercfg-ljngs namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 0a5a3f79-a93b-4f0b-9b43-f4f94215d1a3 resourceVersion: "38079" uid: a0593729-9454-4442-abdf-b5127d646e1d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-22T17:31:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"631c23e8-e8dd-40b5-9b50-e41db73fa8a0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:31:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:07:03Z" name: registry-dockercfg-rmqdq namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 631c23e8-e8dd-40b5-9b50-e41db73fa8a0 resourceVersion: "38087" uid: 537469e3-089d-4798-b049-65a35e07ef0b type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "40048"