--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T07:48:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3f5b8202-447c-41e3-80fc-004a6a62f4aa"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:48:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T07:48:02Z" name: builder-dockercfg-jfml4 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 3f5b8202-447c-41e3-80fc-004a6a62f4aa resourceVersion: "3861" uid: e61ce835-bf1a-4f5f-89ac-13e2ec7bd3b9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-17T07:47:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T07:47:56Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3e4a083a-ba02-4345-bce5-491f360f30e2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:47:56Z" name: cluster-image-registry-operator-dockercfg-6vrg5 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 3e4a083a-ba02-4345-bce5-491f360f30e2 resourceVersion: "3243" uid: 14dc6467-463a-4101-9ee2-9b2aac3aa4d7 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T07:47:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"474f077a-a0d7-411a-9929-3b121f4076df"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:47:56Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T07:47:57Z" name: default-dockercfg-ddhzk namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 474f077a-a0d7-411a-9929-3b121f4076df resourceVersion: "3250" uid: bbd4f485-0f8e-44bf-bfad-1b5bb7eb0361 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T07:48:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7ef255bf-edf1-40a1-94a5-fd0f2063ebe0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:48:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T07:48:02Z" name: deployer-dockercfg-mkmz5 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 7ef255bf-edf1-40a1-94a5-fd0f2063ebe0 resourceVersion: "3862" uid: 7fa83fe4-e95e-41c6-b9eb-a8bc35947ecb type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:dcbf80fedc2daf98d0a9d496b3c7cfcfeea6369c43219e5981b70219e4ebee02 creationTimestamp: "2026-04-17T07:47:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T07:47:36Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "2158" uid: 4504b1f4-31e9-477b-bcb5-42aa64bd9753 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T07:54:13Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: e648849c-98a4-49bd-9456-7882e873bd90 service.beta.openshift.io/expiry: "2028-04-16T07:54:13Z" creationTimestamp: "2026-04-17T07:54:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"e648849c-98a4-49bd-9456-7882e873bd90"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T07:54:14Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: e648849c-98a4-49bd-9456-7882e873bd90 resourceVersion: "8005" uid: 7c8ea98b-28cc-4e92-b7a1-bc4a49866e5c type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-17T07:47:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T07:47:36Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "2155" uid: 01fbaa07-6f0c-454c-b4ae-7e2d36c941e3 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-17T07:47:30Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-17T07:47:30Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1774" uid: d5a63d85-f0f0-4a85-bef5-719719bb4ac1 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-17T07:47:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T07:47:56Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9c3b69a5-f315-4c21-8dcf-4c070927289c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:47:56Z" name: node-ca-dockercfg-rf8rr namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 9c3b69a5-f315-4c21-8dcf-4c070927289c resourceVersion: "3244" uid: 67590e94-bf2e-4f78-8127-79db150c293c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-17T07:47:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"83ef351e-83e8-4fb9-b6f4-7dc48d551690"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:47:56Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T07:47:57Z" name: pruner-dockercfg-75jh6 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 83ef351e-83e8-4fb9-b6f4-7dc48d551690 resourceVersion: "3253" uid: 1ff78b90-4bde-4c4d-9950-e1eb96f96305 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-17T07:47:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"99e67b38-32f0-48fc-a612-5aca2179bda5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:47:56Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T07:47:57Z" name: registry-dockercfg-6b9tl namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 99e67b38-32f0-48fc-a612-5aca2179bda5 resourceVersion: "3257" uid: aa125191-254e-46ce-b7fa-dc4886bcf233 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21986"