--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T17:30:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"89465118-9a51-41ec-97b0-7a31d5c29ca1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:30:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:42:40Z" name: builder-dockercfg-wztg8 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 89465118-9a51-41ec-97b0-7a31d5c29ca1 resourceVersion: "38592" uid: 85138b89-ff88-4365-bf76-836104774da9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-22T17:30:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0ae6d25d-cef1-4d6c-88a5-8e5b543c4578"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:30:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:42:34Z" name: cluster-image-registry-operator-dockercfg-ctg7d namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 0ae6d25d-cef1-4d6c-88a5-8e5b543c4578 resourceVersion: "38392" uid: 652388e4-1b26-42b7-bc6b-f1ed4b38ca80 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T17:30:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"37b9170b-6fa3-4513-b6dd-e7aea83de007"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:30:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:42:35Z" name: default-dockercfg-6qxdw namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 37b9170b-6fa3-4513-b6dd-e7aea83de007 resourceVersion: "38452" uid: 26726c9f-c858-4345-b09a-a9de9f98bbbd type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T17:30:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d8f5da3b-a088-481f-afb9-c27ccc3ab2e9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:30:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:42:40Z" name: deployer-dockercfg-m7znp namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: d8f5da3b-a088-481f-afb9-c27ccc3ab2e9 resourceVersion: "38613" uid: ef89b9b8-d252-4ce2-b0c4-d4e15c6818b9 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:957318afb9ef2a5289033307619c6c5ef9606c4353be5bae4226e863f5e852d6 creationTimestamp: "2026-04-22T17:30:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T17:30:27Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1812" uid: fb54a736-9aa1-4888-8c64-6d27d4e922d3 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T17:34:25Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: b5ff9bd9-cafa-407f-be1c-96547b709c2d service.beta.openshift.io/expiry: "2028-04-21T17:34:25Z" creationTimestamp: "2026-04-22T17:34:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"b5ff9bd9-cafa-407f-be1c-96547b709c2d"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T17:34:25Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: b5ff9bd9-cafa-407f-be1c-96547b709c2d resourceVersion: "6252" uid: 9722a4b9-0eeb-4c20-a689-986f4bb146fe type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-22T17:30:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T17:30:27Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1810" uid: 7b8f3b4a-2afe-48fe-8dde-62dc836b66d4 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-22T17:30:22Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-22T17:30:22Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1543" uid: 42bf6501-78c3-434a-b139-161a6c1bc5ba type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-22T17:30:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5c84130e-e742-4542-9c8c-97f06f91702b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:30:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:42:34Z" name: node-ca-dockercfg-kc7pm namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 5c84130e-e742-4542-9c8c-97f06f91702b resourceVersion: "38377" uid: 341051d6-141a-486a-9cda-d783786540fc type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-22T17:30:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"15655255-9050-4d4b-9a66-ffbd54c834a4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:30:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:42:35Z" name: pruner-dockercfg-xptxt namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 15655255-9050-4d4b-9a66-ffbd54c834a4 resourceVersion: "38443" uid: fbacc9f3-fc8d-416c-9422-b8a6f92a4cf2 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-22T17:30:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"536386d1-d4d9-4525-9aef-376a72a4e9e2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:30:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:42:35Z" name: registry-dockercfg-mmlbf namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 536386d1-d4d9-4525-9aef-376a72a4e9e2 resourceVersion: "38447" uid: e8d3a116-603d-4d75-a9aa-afb04cde6a0a type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "48062"