--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T16:35:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cfd96a0e-fe62-4de2-9a99-f64f198d7026"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T16:35:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T17:11:43Z" name: builder-dockercfg-6h6np namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: cfd96a0e-fe62-4de2-9a99-f64f198d7026 resourceVersion: "25143" uid: f7c4360d-b1a1-42e0-a1de-24a7f608207b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE4OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-24T16:35:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d6ee0de5-2498-4430-a536-5b2d80637eb1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T16:35:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T17:11:42Z" name: cluster-image-registry-operator-dockercfg-flq5d namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: d6ee0de5-2498-4430-a536-5b2d80637eb1 resourceVersion: "25012" uid: c4bba668-2137-487a-b99b-f29b72f08943 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T16:35:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"16b57520-8715-4c3f-bdbb-b023f9f5d163"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T16:35:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T17:11:42Z" name: default-dockercfg-mtzcb namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 16b57520-8715-4c3f-bdbb-b023f9f5d163 resourceVersion: "25113" uid: aeae4fca-aedd-4eca-80b0-8becdc29ddf5 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T16:35:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4e9d6df8-8cea-4bbd-b8f8-57599bdc9349"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T16:35:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T17:11:43Z" name: deployer-dockercfg-nh27j namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 4e9d6df8-8cea-4bbd-b8f8-57599bdc9349 resourceVersion: "25154" uid: 970bbc44-4010-4280-84ec-ab2f9837169c type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:fe82ba3c352c6fa1f4cb85de0497121a217116c180d2025d1250e14a73934c10 creationTimestamp: "2026-04-24T16:35:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-24T16:35:41Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "3580" uid: 004d4c71-f9bf-44d4-86e0-b5566d9a6219 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T16:41:24Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 0f6da0c7-744a-4e55-bc47-12b4e8f2fa3f service.beta.openshift.io/expiry: "2028-04-23T16:41:24Z" creationTimestamp: "2026-04-24T16:41:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"0f6da0c7-744a-4e55-bc47-12b4e8f2fa3f"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T16:41:25Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 0f6da0c7-744a-4e55-bc47-12b4e8f2fa3f resourceVersion: "7837" uid: 1aa5c02c-c8fb-4917-ac57-ccad926d79db type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-24T16:35:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-24T16:35:41Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "3578" uid: 8232a954-ea3a-4d03-8d30-1c6493e8e3cf type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-24T16:35:05Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-24T16:35:05Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1762" uid: 04ec052b-0abc-4fd5-a083-ace9382aaed3 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-24T16:35:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5af281c8-b3c3-4303-91a0-7e1c88a1dc06"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T16:35:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T17:11:42Z" name: node-ca-dockercfg-lqszl namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 5af281c8-b3c3-4303-91a0-7e1c88a1dc06 resourceVersion: "25053" uid: 094a9662-b5f7-4394-9660-5d2438a3e4cf type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-24T16:35:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8e5ca88d-be19-420b-a8d4-76a6d374bf2d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T16:35:40Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T17:11:45Z" name: pruner-dockercfg-h95bb namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 8e5ca88d-be19-420b-a8d4-76a6d374bf2d resourceVersion: "25254" uid: 85d5507c-a818-4482-8c57-8c13471d1507 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-24T16:35:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"dc797152-737d-45ec-8bbd-a7710b75cdbf"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T16:35:41Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T17:11:45Z" name: registry-dockercfg-6j55m namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: dc797152-737d-45ec-8bbd-a7710b75cdbf resourceVersion: "25258" uid: a2f373a6-fa16-4291-ac54-60d89c7493f0 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "43183"