--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T22:26:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8b7564b9-6b95-44c8-91c9-b2d3e20f2ec6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T22:26:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T22:26:33Z" name: builder-dockercfg-b8p8f namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 8b7564b9-6b95-44c8-91c9-b2d3e20f2ec6 resourceVersion: "4231" uid: 80ca9b56-7d4a-420a-901a-593da8502f59 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE4OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-24T22:26:24Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4a919b9a-b689-44c0-b4b9-96ac84a6dd80"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T22:26:24Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T22:26:31Z" name: cluster-image-registry-operator-dockercfg-qjqp9 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 4a919b9a-b689-44c0-b4b9-96ac84a6dd80 resourceVersion: "3945" uid: 71faef94-3b9c-460d-acc0-cf29ecc1116d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T22:26:24Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"58e1b35e-34c1-4301-827f-a22d5a27f922"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T22:26:24Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T22:26:31Z" name: default-dockercfg-9t2hz namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 58e1b35e-34c1-4301-827f-a22d5a27f922 resourceVersion: "3947" uid: 9d5a3594-630d-4065-9b3e-6c29830fd80d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T22:26:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f239c0cb-988a-4d0d-a527-e186d4456030"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T22:26:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T22:26:33Z" name: deployer-dockercfg-szfgw namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: f239c0cb-988a-4d0d-a527-e186d4456030 resourceVersion: "4233" uid: 7242ba7f-b88c-4466-9c72-6185dade9bfd type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:599986ae9984049ab5e3558e560d863b4f7d6aa4e7f13440aa98a6f6cbc3b1d5 creationTimestamp: "2026-04-24T22:26:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-24T22:26:30Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "3809" uid: d87b370c-f380-433d-abab-a2215c00e8d0 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T22:32:04Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 90fd123e-b92f-4696-b1f2-70ae959b04f3 service.beta.openshift.io/expiry: "2028-04-23T22:32:04Z" creationTimestamp: "2026-04-24T22:32:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"90fd123e-b92f-4696-b1f2-70ae959b04f3"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T22:32:04Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 90fd123e-b92f-4696-b1f2-70ae959b04f3 resourceVersion: "7677" uid: 251dda8f-c6ae-4dba-9c79-97c80bb4a4c3 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-24T22:26:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-24T22:26:30Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "3805" uid: 3adf8f61-3322-4f54-aaf4-7d25d754388b type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-24T22:25:57Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-24T22:25:57Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1708" uid: 9dfd3388-d95e-414c-8a54-86e9f57c4d01 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-24T22:26:24Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"daeb0e67-053d-437c-bb91-6b8bf59d4473"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T22:26:24Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T22:26:31Z" name: node-ca-dockercfg-ppgwm namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: daeb0e67-053d-437c-bb91-6b8bf59d4473 resourceVersion: "3946" uid: 39c6b369-7c09-4aec-9818-ba1e09267690 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-24T22:26:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"53b907aa-387e-4d47-b5c8-3c00c240475c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T22:26:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T22:26:34Z" name: pruner-dockercfg-f6q4t namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 53b907aa-387e-4d47-b5c8-3c00c240475c resourceVersion: "4257" uid: 233f5e1b-7a2b-40f7-87d8-d4fb41bae2b0 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-24T22:26:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7bfd2983-7818-4d8a-95e9-cbb3250df59f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T22:26:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T22:26:34Z" name: registry-dockercfg-xzwft namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 7bfd2983-7818-4d8a-95e9-cbb3250df59f resourceVersion: "4270" uid: 1a35e229-f0df-47bb-9556-42fa81f54efa type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "24739"