--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-23T17:50:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4a853323-3496-4542-8743-d9b352cbf093"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:50:51Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T18:29:49Z" name: builder-dockercfg-h5n45 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 4a853323-3496-4542-8743-d9b352cbf093 resourceVersion: "27097" uid: e21425af-4d6e-4ae6-af17-00e7822dfa1d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-23T17:50:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b37b03da-62de-42cf-b666-25b2e6c4aec8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:50:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T18:29:47Z" name: cluster-image-registry-operator-dockercfg-krzj8 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: b37b03da-62de-42cf-b666-25b2e6c4aec8 resourceVersion: "26946" uid: 93be500e-3a18-428a-bf35-a9e105a07449 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-23T17:50:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2c184533-da2c-4a36-b0d7-bac264070b55"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:50:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T18:29:47Z" name: default-dockercfg-cfrrc namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 2c184533-da2c-4a36-b0d7-bac264070b55 resourceVersion: "26906" uid: e9b72df0-afbf-45ec-8b38-1f11ddd6b76b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-23T17:50:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d5aae887-c594-4721-a2b7-19793d503cb6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:50:51Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T18:29:49Z" name: deployer-dockercfg-czgmr namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: d5aae887-c594-4721-a2b7-19793d503cb6 resourceVersion: "27111" uid: 0ded3a74-b3cd-421a-a92f-35d64a1c7eef type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:9ca4c02e147de840e60e274d874f5aa46d29fd737ad96c2c6c257bf30a1b8748 creationTimestamp: "2026-04-23T17:53:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-23T17:53:47Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "4151" uid: 9cb6d312-5ada-4e74-838e-4282b8271f63 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-22T17:55:03Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 5363dcf9-fb6a-42c1-aa35-0adca58db2d8 service.beta.openshift.io/expiry: "2028-04-22T17:55:03Z" creationTimestamp: "2026-04-23T17:55:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"5363dcf9-fb6a-42c1-aa35-0adca58db2d8"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-23T17:55:04Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 5363dcf9-fb6a-42c1-aa35-0adca58db2d8 resourceVersion: "6401" uid: 63efc642-9226-4262-a5af-7b5ceaffddbc type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-23T17:53:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-23T17:53:47Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "4149" uid: 2553b1c9-3976-42a2-9515-aaffc7f3a0c3 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-23T17:49:51Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-23T17:49:51Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1746" uid: e30acbd2-3b2f-46aa-8a7d-da6cb6596b99 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-23T17:50:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"846d3f69-67df-4dc4-96f0-fe06b176df29"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:50:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T18:29:47Z" name: node-ca-dockercfg-xb587 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 846d3f69-67df-4dc4-96f0-fe06b176df29 resourceVersion: "26904" uid: d5397d76-b5bf-401c-a720-ac00c752d341 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-23T17:53:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"76d09774-89e8-4346-a65d-7a31c42b76d5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:53:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T18:29:51Z" name: pruner-dockercfg-jcp6p namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 76d09774-89e8-4346-a65d-7a31c42b76d5 resourceVersion: "27185" uid: 839ac9b0-bdc9-48e0-a0ad-8ff946e9fd9c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-23T17:53:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d863f190-fa9c-4923-8e4e-ec1babb45f90"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:53:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T18:29:51Z" name: registry-dockercfg-psc88 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: d863f190-fa9c-4923-8e4e-ec1babb45f90 resourceVersion: "27186" uid: d5ef6de5-8723-49c3-a3c6-1b517d02cefd type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "41751"