--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T18:43:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:43:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"90a1d1be-4d32-4b19-adf5-04ffa6ec943b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:04Z" name: builder-dockercfg-vwhjl namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 90a1d1be-4d32-4b19-adf5-04ffa6ec943b resourceVersion: "4013" uid: c566ef11-985a-4b68-88a5-90eeeb8de751 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE4OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-22T18:42:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e0d340b3-c477-4da5-856d-a1606a03587a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:42:58Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:42:59Z" name: cluster-image-registry-operator-dockercfg-rbwgr namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: e0d340b3-c477-4da5-856d-a1606a03587a resourceVersion: "3382" uid: 909db1f3-5664-457b-9e1d-897e2bc55fb3 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T18:42:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0fb3c5f5-52d7-4ac6-b2dd-6bff7ed4e7b8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:42:58Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:42:59Z" name: default-dockercfg-twnc9 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 0fb3c5f5-52d7-4ac6-b2dd-6bff7ed4e7b8 resourceVersion: "3390" uid: 1783a629-8b35-4f5d-96d2-23c309e9b2ca type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T18:43:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:43:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d2da148e-6eb9-42cb-91c5-ae38e2423468"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:04Z" name: deployer-dockercfg-wtltn namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: d2da148e-6eb9-42cb-91c5-ae38e2423468 resourceVersion: "4014" uid: 759c3b39-1b38-4075-8499-40cfc65a7764 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:904f4ef8619cdb521eba06db9766e838457c4d757820564a099a0798e131a5ae creationTimestamp: "2026-04-22T18:42:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T18:42:34Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1978" uid: 49b84335-c725-4447-b13b-1e69807f3a8d type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T18:49:04Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 1f66e07f-9c10-4883-95c2-6a6e3575967a service.beta.openshift.io/expiry: "2028-04-21T18:49:04Z" creationTimestamp: "2026-04-22T18:49:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"1f66e07f-9c10-4883-95c2-6a6e3575967a"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T18:49:04Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 1f66e07f-9c10-4883-95c2-6a6e3575967a resourceVersion: "7903" uid: 38ef57b5-4b74-42c4-a7b4-f434ef3b33a3 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-22T18:42:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T18:42:34Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1976" uid: fdbac1d2-83a1-43c6-9fb0-0562cc0bcc57 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-22T18:42:30Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-22T18:42:30Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1667" uid: fcf7fdfa-c847-4bc8-90c3-bb9d8c7d920d type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-22T18:42:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:42:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"71278fab-fb08-4dbb-a1d6-67b52238dad8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:42:59Z" name: node-ca-dockercfg-wg8t6 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 71278fab-fb08-4dbb-a1d6-67b52238dad8 resourceVersion: "3393" uid: 226aa6e7-ce32-4a3c-bdc5-2d8d73ed7bf2 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-22T18:42:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:42:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"591c3375-cc38-432e-a3e5-3eaa1b174475"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:42:59Z" name: pruner-dockercfg-sz4vp namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 591c3375-cc38-432e-a3e5-3eaa1b174475 resourceVersion: "3394" uid: 4fdf8ba0-1134-4c35-b583-af86953fdda5 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-22T18:42:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:42:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1a97f6cb-1ae4-464b-87ae-08126e2757e7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:42:59Z" name: registry-dockercfg-c9m64 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 1a97f6cb-1ae4-464b-87ae-08126e2757e7 resourceVersion: "3414" uid: 07ae303b-92da-4a62-a70f-8db2f7910528 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "37344"