--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-21T03:54:11Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ebb045c3-a9a0-4001-9253-5da562c5cd62"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T03:54:11Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T03:54:22Z" name: builder-dockercfg-pd94q namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: ebb045c3-a9a0-4001-9253-5da562c5cd62 resourceVersion: "4240" uid: 2d176677-be29-4064-84b9-157be769884f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE4OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-21T03:54:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"21674f0c-e417-40fc-8b28-18450fd87d6d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T03:54:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T03:54:19Z" name: cluster-image-registry-operator-dockercfg-9mg4b namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 21674f0c-e417-40fc-8b28-18450fd87d6d resourceVersion: "4074" uid: 70a7c291-7426-427d-b927-3b650178cd84 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-21T03:54:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cd879d0d-6f3d-49ed-9625-3243f9b83769"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T03:54:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T03:54:19Z" name: default-dockercfg-8k44t namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: cd879d0d-6f3d-49ed-9625-3243f9b83769 resourceVersion: "4071" uid: 8f776234-045a-41ad-bace-4906ac901877 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-21T03:54:11Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"23623db6-f34c-473b-9889-3481d70a0174"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T03:54:11Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T03:54:22Z" name: deployer-dockercfg-f6zvv namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 23623db6-f34c-473b-9889-3481d70a0174 resourceVersion: "4242" uid: fd8cb00e-df6e-441d-bea0-cb3dc2928eca type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:dbb56818899b81e49cbec7be58dce16772ebe986c9c815d55f4693904b5db691 creationTimestamp: "2026-04-21T03:54:19Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-21T03:54:19Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "3966" uid: ed3d0caa-67dc-4eed-85a0-021981b11f90 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T03:59:44Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: d6e0f179-aeca-4955-bb38-08c041cfe668 service.beta.openshift.io/expiry: "2028-04-20T03:59:44Z" creationTimestamp: "2026-04-21T03:59:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"d6e0f179-aeca-4955-bb38-08c041cfe668"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T03:59:45Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: d6e0f179-aeca-4955-bb38-08c041cfe668 resourceVersion: "7685" uid: d2461ff7-63d7-458f-b419-999852911fe9 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-21T03:54:19Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-21T03:54:19Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "3962" uid: 53e73f51-beb1-4a4e-8b91-72781594fdf6 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-21T03:53:31Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-21T03:53:31Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1636" uid: 12a1b710-b6ae-4717-b96e-1628407ab693 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-21T03:54:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5f9d758d-6dfd-4233-b415-883036257961"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T03:54:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T03:54:19Z" name: node-ca-dockercfg-bsm59 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 5f9d758d-6dfd-4233-b415-883036257961 resourceVersion: "4072" uid: 940e1b9d-0f43-49ad-93bb-f9aa49520c4c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-21T03:54:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6eb116ed-42d4-4170-9e59-dd0fd88e36c2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T03:54:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T03:54:23Z" name: pruner-dockercfg-mpzs5 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 6eb116ed-42d4-4170-9e59-dd0fd88e36c2 resourceVersion: "4303" uid: 0c98bf4a-d9fe-40aa-9159-b22c1cc70622 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-21T03:54:19Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1231a0a4-054e-40a9-9113-af08bcd525d3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T03:54:19Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T03:54:23Z" name: registry-dockercfg-fzhgd namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 1231a0a4-054e-40a9-9113-af08bcd525d3 resourceVersion: "4304" uid: e7c35f02-7488-49ec-87dc-eced106aa7cf type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "25629"