--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T21:26:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:26:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"adca7e16-0b8b-44d6-9690-b097ba87694e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:26:28Z" name: builder-dockercfg-hjbn7 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: adca7e16-0b8b-44d6-9690-b097ba87694e resourceVersion: "4296" uid: dbe880a5-2d67-4fa1-a9e8-903b21ca8462 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-24T21:26:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:26:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3a3b5517-7447-4e4b-b18b-ac9a5c179c1a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:26:22Z" name: cluster-image-registry-operator-dockercfg-xv4v8 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 3a3b5517-7447-4e4b-b18b-ac9a5c179c1a resourceVersion: "3693" uid: 10064210-6e0e-48d0-b7a9-75d4b749b6e2 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T21:26:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:26:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"eef25951-d0de-4fd2-bf75-c5e29d312bec"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:26:22Z" name: default-dockercfg-dcjg8 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: eef25951-d0de-4fd2-bf75-c5e29d312bec resourceVersion: "3707" uid: 19b71fa8-78ab-476c-86e7-8b984ad6b0ff type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T21:26:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:26:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8d515aab-63f5-4711-9c10-c2f6a770c457"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:26:28Z" name: deployer-dockercfg-mthtx namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 8d515aab-63f5-4711-9c10-c2f6a770c457 resourceVersion: "4282" uid: f7ec62f8-01c8-498a-8ae3-fd09ad9dd4aa type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:771b126eec68f7561b49781d7e2aa4c45930709bd1b580b06f42be67c1455fb9 creationTimestamp: "2026-04-24T21:25:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-24T21:25:55Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "3082" uid: 8016e135-cbdf-4fcd-bee4-b78c608fc7a5 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T21:31:24Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 0ec97475-7b38-4215-8b4e-ed147a0fe129 service.beta.openshift.io/expiry: "2028-04-23T21:31:24Z" creationTimestamp: "2026-04-24T21:31:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"0ec97475-7b38-4215-8b4e-ed147a0fe129"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T21:31:25Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 0ec97475-7b38-4215-8b4e-ed147a0fe129 resourceVersion: "7712" uid: 351d73b9-5a99-4eca-bf04-6dc69f239368 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-24T21:25:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-24T21:25:55Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "3081" uid: 6bea8db4-2bbd-4392-bbfb-3b2b894d4980 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-24T21:25:20Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-24T21:25:20Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1653" uid: 48661a30-27bc-440f-a217-d079db5aa288 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-24T21:26:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:26:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2d1ade7d-8d00-4f10-97b7-e887ce7a0aea"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:26:22Z" name: node-ca-dockercfg-zsbhm namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 2d1ade7d-8d00-4f10-97b7-e887ce7a0aea resourceVersion: "3709" uid: 9e2add3f-a2aa-45c6-b7c9-51abff604973 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-24T21:26:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:26:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b209d7c3-4655-4a27-a1bb-85c253d91818"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:26:22Z" name: pruner-dockercfg-jtzlr namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: b209d7c3-4655-4a27-a1bb-85c253d91818 resourceVersion: "3711" uid: cd117e23-a5aa-4695-9f2e-2a0e2b174b62 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-24T21:26:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:26:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f3270bde-e281-4fa9-a416-15abb5a8b11b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:26:22Z" name: registry-dockercfg-ptjx6 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: f3270bde-e281-4fa9-a416-15abb5a8b11b resourceVersion: "3712" uid: 91aea946-149e-4436-b5c3-373ab4e12d38 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21509"