--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T23:49:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"58dfeba1-885a-4013-9294-798659ba9963"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T23:49:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T23:50:09Z" name: builder-dockercfg-65qs6 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 58dfeba1-885a-4013-9294-798659ba9963 resourceVersion: "4175" uid: a6a0c6dd-7516-4889-9c26-b08f5328745f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-24T23:49:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f49cfeeb-c99b-4ad8-828a-e1d361166ec5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T23:49:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T23:50:07Z" name: cluster-image-registry-operator-dockercfg-zrs4c namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: f49cfeeb-c99b-4ad8-828a-e1d361166ec5 resourceVersion: "4035" uid: b0d87eac-1cbf-4247-aa31-1324b97046f7 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T23:49:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d8b9d7cb-30e7-410d-b1a7-863955a4ab45"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T23:49:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T23:50:07Z" name: default-dockercfg-sx48s namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: d8b9d7cb-30e7-410d-b1a7-863955a4ab45 resourceVersion: "4038" uid: ccebc1e8-0be0-4995-b82c-00f50bd8f008 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T23:49:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c1485794-cb2d-4b53-8208-62dc919262d9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T23:49:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T23:50:09Z" name: deployer-dockercfg-2m77t namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: c1485794-cb2d-4b53-8208-62dc919262d9 resourceVersion: "4174" uid: ea65b075-d590-47ee-9161-6dc68dcc7d2c type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:15e81fa02c76ae84201933488aa130abb20c15d3f843b4f6d2f77545be0a4cba creationTimestamp: "2026-04-24T23:50:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-24T23:50:06Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "3927" uid: 7768ab86-9a2f-4f3e-bc64-37cd5c865dc6 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T23:55:59Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: be0e7b60-64a3-46ec-8584-c0083f422ef1 service.beta.openshift.io/expiry: "2028-04-23T23:55:59Z" creationTimestamp: "2026-04-24T23:56:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"be0e7b60-64a3-46ec-8584-c0083f422ef1"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T23:56:00Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: be0e7b60-64a3-46ec-8584-c0083f422ef1 resourceVersion: "7949" uid: b2082e89-ebe0-445a-82d0-410f6a1bb151 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-24T23:50:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-24T23:50:06Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "3926" uid: 1bdb620f-7acb-452c-9483-18724d1a4eb7 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-24T23:49:11Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-24T23:49:11Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1742" uid: c68595c0-71dc-4c89-9a47-76dd17839b0a type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-24T23:49:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"02872e3e-0f2b-4706-aaba-8cd65bb6c971"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T23:49:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T23:50:07Z" name: node-ca-dockercfg-rgfxr namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 02872e3e-0f2b-4706-aaba-8cd65bb6c971 resourceVersion: "4046" uid: c57bb0ec-1533-4e2b-bc3b-6c173fe1e4b1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-24T23:50:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d7270799-a10f-4077-b10f-3f3212dc8a22"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T23:50:05Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T23:50:10Z" name: pruner-dockercfg-vbkd9 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: d7270799-a10f-4077-b10f-3f3212dc8a22 resourceVersion: "4246" uid: 6d06a4bc-d81e-47f5-a6c7-740e7ea4b56d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-24T23:50:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5c3540c0-2128-4a38-9412-8eb068b18e74"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T23:50:06Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T23:50:10Z" name: registry-dockercfg-f8xnt namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 5c3540c0-2128-4a38-9412-8eb068b18e74 resourceVersion: "4248" uid: b863f3b8-1945-4690-a880-79c9001bd332 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "22021"