--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T11:12:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:12:40Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4cd37d63-bad1-4710-a1d3-f8da79cc397b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:12:40Z" name: builder-dockercfg-wbpwm namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 4cd37d63-bad1-4710-a1d3-f8da79cc397b resourceVersion: "3563" uid: 3397c403-4a45-41bd-8966-fbbe1322b744 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-17T11:12:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:12:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9b93786a-8b33-4633-bf11-5382d7870577"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:12:35Z" name: cluster-image-registry-operator-dockercfg-dt99r namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 9b93786a-8b33-4633-bf11-5382d7870577 resourceVersion: "2941" uid: a423eea6-a5bf-4068-9aed-b23b6279b61c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T11:12:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:12:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"30572bc0-abf0-4333-a779-af50afaddf26"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:12:35Z" name: default-dockercfg-bvmt4 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 30572bc0-abf0-4333-a779-af50afaddf26 resourceVersion: "2945" uid: 8d9324ea-19e0-4549-967a-20c46660ec96 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T11:12:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:12:40Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6172aaf1-b378-431c-b5dd-a9c7bbff2b76"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:12:40Z" name: deployer-dockercfg-fblg8 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 6172aaf1-b378-431c-b5dd-a9c7bbff2b76 resourceVersion: "3560" uid: 4a1248d1-cb0b-472f-b9d1-31e88ffd330f type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a76cc32e4221f708cffd5b1679e78f28f14b66ef465f07e5bcead3ad28412f4e creationTimestamp: "2026-04-17T11:12:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T11:12:02Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "2048" uid: c39c40c3-f409-4a6a-ae62-350324e59a0c type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T11:18:31Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 36bbc421-1321-422f-afea-bd661d46dec4 service.beta.openshift.io/expiry: "2028-04-16T11:18:31Z" creationTimestamp: "2026-04-17T11:18:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"36bbc421-1321-422f-afea-bd661d46dec4"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T11:18:32Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 36bbc421-1321-422f-afea-bd661d46dec4 resourceVersion: "7775" uid: e7c4800b-e0e0-48bf-87e6-82558f901883 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-17T11:12:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T11:12:02Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "2045" uid: ea95034a-37fa-4683-bd05-e0d8739aa6fb type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-17T11:11:56Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-17T11:11:56Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1832" uid: a713f5be-3c79-4bdc-8802-6e25f81c0b69 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-17T11:12:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:12:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2a88cdbe-f42d-4b19-9e9e-d1e9d58f1c28"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:12:35Z" name: node-ca-dockercfg-vzb99 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 2a88cdbe-f42d-4b19-9e9e-d1e9d58f1c28 resourceVersion: "2946" uid: 23fe605a-2b4f-4dda-8b99-080a67207077 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-17T11:12:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:12:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3e36383e-a377-43ea-bd83-6a8e13739155"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:12:35Z" name: pruner-dockercfg-27s9r namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 3e36383e-a377-43ea-bd83-6a8e13739155 resourceVersion: "2947" uid: 887e842b-02bd-4e82-b455-e2f468eb3945 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-17T11:12:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:12:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e520e339-f6c2-43da-8398-a956cea33175"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:12:35Z" name: registry-dockercfg-xz4zw namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: e520e339-f6c2-43da-8398-a956cea33175 resourceVersion: "2948" uid: c2e5dea8-1579-4d8a-845a-5b8aa01d045c type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21940"