--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-21T03:54:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e21659c8-9fee-4865-96c6-b0098f3b0f65"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T03:54:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:30:36Z" name: builder-dockercfg-njvwh namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: e21659c8-9fee-4865-96c6-b0098f3b0f65 resourceVersion: "26347" uid: 62e175ea-85a5-493a-8121-bc15ab19aa5b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-21T03:54:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5a66b899-647f-4483-9771-f8bf944cff2c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T03:54:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:30:31Z" name: cluster-image-registry-operator-dockercfg-92bdf namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 5a66b899-647f-4483-9771-f8bf944cff2c resourceVersion: "26181" uid: ebc0197a-2372-49bd-a774-ff89ee1580d6 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-21T03:54:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e54c7e08-ee75-4286-81ad-a0a8641a9744"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T03:54:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:30:31Z" name: default-dockercfg-58lf8 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: e54c7e08-ee75-4286-81ad-a0a8641a9744 resourceVersion: "26192" uid: 1d517180-ff7a-4617-b64c-6e53d854cfc0 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-21T03:54:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e356e948-993f-41ce-888f-ac135ed7f99b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T03:54:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:30:36Z" name: deployer-dockercfg-bmd27 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: e356e948-993f-41ce-888f-ac135ed7f99b resourceVersion: "26350" uid: b7958c09-ea66-41b9-baad-cc315ea528dd type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:9ed03688423baab42a66d994c4c499a8cc917a9348f92250a167b3646cfa9c8f creationTimestamp: "2026-04-21T03:53:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-21T03:53:46Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1804" uid: 717b9dda-af07-4b91-bd44-a04a575f8a8e type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T03:58:07Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 1c230ad6-90d2-4691-b644-71a5d6ac74c7 service.beta.openshift.io/expiry: "2028-04-20T03:58:07Z" creationTimestamp: "2026-04-21T03:58:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"1c230ad6-90d2-4691-b644-71a5d6ac74c7"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T03:58:08Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 1c230ad6-90d2-4691-b644-71a5d6ac74c7 resourceVersion: "7336" uid: bee601fe-d845-48a3-b4e4-2fbf5114f6ef type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-21T03:53:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-21T03:53:46Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1800" uid: 2bd4ed81-ffb0-4758-886e-eafcc70326fa type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-21T03:53:44Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-21T03:53:44Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1648" uid: e18e1a91-3ae2-492b-8631-39f7a706e872 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-21T03:54:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f2f6bdb9-765e-48cd-9ae1-b96bfc0215b9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T03:54:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:30:31Z" name: node-ca-dockercfg-kkx9s namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: f2f6bdb9-765e-48cd-9ae1-b96bfc0215b9 resourceVersion: "26197" uid: b0e9c54b-5540-4aa6-b984-06f82a09965e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-21T03:54:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"73352ded-7334-438e-9470-748ea2f4b53f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T03:54:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:30:31Z" name: pruner-dockercfg-7r28x namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 73352ded-7334-438e-9470-748ea2f4b53f resourceVersion: "26185" uid: 4e4c415e-135c-442e-9485-fe23b517851f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-21T03:54:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b24be4df-2b7f-4e39-bb79-a3b3a400b889"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T03:54:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:30:31Z" name: registry-dockercfg-ntv6f namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: b24be4df-2b7f-4e39-bb79-a3b3a400b889 resourceVersion: "26178" uid: 1e60dc05-b2ea-43eb-8a79-e3d4796437e5 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "41833"