--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T11:12:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:12:23Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b3918396-46bc-4cbe-80df-775cd93182e7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:12:23Z" name: builder-dockercfg-zdmtw namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: b3918396-46bc-4cbe-80df-775cd93182e7 resourceVersion: "3772" uid: a2d9f0e0-f5c2-482d-aa10-637b4535bcd5 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE4OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-17T11:12:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:12:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3e1a4a5c-d322-47fd-b89e-7cc391a4cd53"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:12:18Z" name: cluster-image-registry-operator-dockercfg-q7f92 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 3e1a4a5c-d322-47fd-b89e-7cc391a4cd53 resourceVersion: "3189" uid: 70304855-b428-4590-8305-74cf765cd2de type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T11:12:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:12:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1fd94136-82de-4d7e-a191-8275123ed04f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:12:18Z" name: default-dockercfg-g67zw namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 1fd94136-82de-4d7e-a191-8275123ed04f resourceVersion: "3187" uid: a67f8427-39c6-4482-bd51-0324d6c28056 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T11:12:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:12:23Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bbcaaf26-8188-4a10-9a97-02e4d139fa27"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:12:23Z" name: deployer-dockercfg-dl5s8 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: bbcaaf26-8188-4a10-9a97-02e4d139fa27 resourceVersion: "3762" uid: a729227d-c5b0-4eb9-92c5-d45771b52a25 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:302937d6365ceaffd9e86cbe834f72e8ee6762c554b47ee189d9142949f78554 creationTimestamp: "2026-04-17T11:11:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T11:11:53Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1831" uid: a87a84a5-2615-49b7-9dc8-5862874234bf type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T11:16:28Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: dea7388d-afbc-48f9-87ab-076a3fa6d07a service.beta.openshift.io/expiry: "2028-04-16T11:16:28Z" creationTimestamp: "2026-04-17T11:16:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"dea7388d-afbc-48f9-87ab-076a3fa6d07a"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T11:16:29Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: dea7388d-afbc-48f9-87ab-076a3fa6d07a resourceVersion: "6812" uid: ef9de155-0a97-443f-aa20-d0d748873d0a type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-17T11:11:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T11:11:53Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1829" uid: 461c49bf-9573-423d-9592-f6779257739c type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-17T11:11:49Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-17T11:11:49Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1627" uid: c5a00d98-5d4b-4a35-b310-2397c8f37885 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-17T11:12:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:12:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ac95eea5-df71-40cb-b45c-b00052dc0914"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:12:18Z" name: node-ca-dockercfg-gq95b namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: ac95eea5-df71-40cb-b45c-b00052dc0914 resourceVersion: "3190" uid: 9539e44a-ec1d-4641-b620-07f3c4c932a8 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-17T11:12:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"765bf731-ef90-4cab-b19a-4a71c5bd5b81"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:12:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:12:19Z" name: pruner-dockercfg-tqrpp namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 765bf731-ef90-4cab-b19a-4a71c5bd5b81 resourceVersion: "3203" uid: 99108667-be61-46c2-ba8d-b9f30dadf58d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-17T11:12:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0384812e-b1bf-4852-b4d0-58981bf71e42"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:12:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:12:19Z" name: registry-dockercfg-7fq9z namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 0384812e-b1bf-4852-b4d0-58981bf71e42 resourceVersion: "3206" uid: 8c3f3fc8-cc09-4e6c-8c48-2d48a5db93af type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "13704"