--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T23:50:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"df59e983-11b9-42a2-bb85-cabfaccec07f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T23:50:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-25T00:26:28Z" name: builder-dockercfg-qqkks namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: df59e983-11b9-42a2-bb85-cabfaccec07f resourceVersion: "26549" uid: 437810aa-6ab2-4ec5-a78d-8dcdbf02f730 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-24T23:50:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3cd1ee9d-3035-4d33-a5b1-e771ed17e2b9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T23:50:23Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-25T00:26:23Z" name: cluster-image-registry-operator-dockercfg-s7wdh namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 3cd1ee9d-3035-4d33-a5b1-e771ed17e2b9 resourceVersion: "26376" uid: aeb92116-b710-45b7-ad2a-b4db70a494e1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T23:50:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"71e2c6b9-c4e3-4dd6-94a1-d9dc1e873e42"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T23:50:23Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-25T00:26:23Z" name: default-dockercfg-n5kdx namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 71e2c6b9-c4e3-4dd6-94a1-d9dc1e873e42 resourceVersion: "26366" uid: ae68fb7b-e84d-49ab-a56f-38a5846212fc type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T23:50:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3df304dd-b50e-4250-bf6b-6889ed8823e6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T23:50:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-25T00:26:28Z" name: deployer-dockercfg-zbfld namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 3df304dd-b50e-4250-bf6b-6889ed8823e6 resourceVersion: "26557" uid: 1cdf64fa-b8f4-4016-ae39-c0d110c1d050 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a5f9520bdf59189ae5acbb47671ea950d655fb0ba6703715fc1e6b4f52b2e7d4 creationTimestamp: "2026-04-24T23:49:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-24T23:49:57Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1936" uid: 93ea883e-a104-470c-9e79-ddd017df780a type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T23:54:12Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 7d59c57c-44cc-40d9-9d8b-8913d30f6acb service.beta.openshift.io/expiry: "2028-04-23T23:54:12Z" creationTimestamp: "2026-04-24T23:54:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"7d59c57c-44cc-40d9-9d8b-8913d30f6acb"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T23:54:13Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 7d59c57c-44cc-40d9-9d8b-8913d30f6acb resourceVersion: "6577" uid: ff586be1-90c5-49f7-9254-3781798922d1 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-24T23:49:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-24T23:49:57Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1934" uid: 9a79e672-763e-4108-9121-565bb62e98cf type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-24T23:49:55Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-24T23:49:55Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1828" uid: e163fe5a-d0d7-42e9-b31d-996a05196ddd type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-24T23:50:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3b05ab6a-a05b-427a-ada4-e7076022c503"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T23:50:23Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-25T00:26:23Z" name: node-ca-dockercfg-n62l4 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 3b05ab6a-a05b-427a-ada4-e7076022c503 resourceVersion: "26392" uid: 453d40e1-3608-48cf-a04e-6765b5420e0c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-24T23:50:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"34914ed1-cea1-4ffa-a55a-43d2c79c88d0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T23:50:23Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-25T00:26:23Z" name: pruner-dockercfg-s58vv namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 34914ed1-cea1-4ffa-a55a-43d2c79c88d0 resourceVersion: "26391" uid: ede744ca-1563-42e2-b0ab-3c2bd5facedb type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-24T23:50:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8b794e1a-ee4f-441e-88a0-173ca62d4ff0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T23:50:23Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-25T00:26:24Z" name: registry-dockercfg-n2vv4 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 8b794e1a-ee4f-441e-88a0-173ca62d4ff0 resourceVersion: "26420" uid: feb68172-c860-4ffb-add1-83aff313d2eb type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "32579"