--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T18:42:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2924a368-7354-404f-8e89-f94f97673e37"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:42:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:09Z" name: builder-dockercfg-rtfzr namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 2924a368-7354-404f-8e89-f94f97673e37 resourceVersion: "26304" uid: c6d9e7d0-972c-41c1-a455-9c7b26d5da32 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE4OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-22T18:42:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1432ca09-2b9e-47fe-a583-6b6afb3aeecc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:42:56Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:07Z" name: cluster-image-registry-operator-dockercfg-9tlkx namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 1432ca09-2b9e-47fe-a583-6b6afb3aeecc resourceVersion: "26132" uid: d8ad924d-cd81-4485-9e01-05f9cfb63a6f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T18:42:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e7ec63ba-a913-407a-8717-ec062525ebc9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:42:56Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:07Z" name: default-dockercfg-826tx namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: e7ec63ba-a913-407a-8717-ec062525ebc9 resourceVersion: "26127" uid: 40df4202-c0c2-458c-b694-03a777c3e8f7 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T18:42:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d8bbc284-244e-4f38-9669-5a0fa050bf5d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:42:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:09Z" name: deployer-dockercfg-44vmf namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: d8bbc284-244e-4f38-9669-5a0fa050bf5d resourceVersion: "26297" uid: c41294d7-8613-4ceb-9880-fe7343454cd1 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:cd62e2e96d7412d6732d9965b04dcabc912a62a6375cc86fe0fcf8771cc66edf creationTimestamp: "2026-04-22T18:43:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T18:43:07Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "3786" uid: 777e0ae3-512c-4ed2-820b-4204608c85be type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T18:48:44Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: b818bb70-6f8a-451b-8cb6-3fea2d622c0c service.beta.openshift.io/expiry: "2028-04-21T18:48:44Z" creationTimestamp: "2026-04-22T18:48:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"b818bb70-6f8a-451b-8cb6-3fea2d622c0c"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T18:48:45Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: b818bb70-6f8a-451b-8cb6-3fea2d622c0c resourceVersion: "7714" uid: 330d8f41-da90-4820-97f4-1f2fa55a8e5a type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-22T18:43:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T18:43:07Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "3781" uid: f80f8cc3-0998-4eac-8834-1422bac8c977 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-22T18:42:31Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-22T18:42:31Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1663" uid: ce591199-803c-48d7-a78b-1ad6c5ad5965 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-22T18:42:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"73bf3bd1-094d-428a-acdb-8acc890924cc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:42:56Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:07Z" name: node-ca-dockercfg-cgt5g namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 73bf3bd1-094d-428a-acdb-8acc890924cc resourceVersion: "26154" uid: 11f9280e-269a-47f9-8790-a00dfa445fe1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-22T18:43:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bf5acaf8-d771-4a71-ad78-ed82ad7c081e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:06Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:10Z" name: pruner-dockercfg-psvrk namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: bf5acaf8-d771-4a71-ad78-ed82ad7c081e resourceVersion: "26326" uid: b4906533-42d5-4544-8299-8d69740f5815 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-22T18:43:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"301b42f7-cc79-4134-a4df-2072afc69964"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:11Z" name: registry-dockercfg-8zvm4 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 301b42f7-cc79-4134-a4df-2072afc69964 resourceVersion: "26369" uid: b0f1b38c-3761-4b1f-93c8-bf4d1dee79db type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "33195"