--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T22:09:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ea075069-ee6b-43b7-9820-aea523e5a066"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T22:09:56Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T22:45:57Z" name: builder-dockercfg-db8qb namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: ea075069-ee6b-43b7-9820-aea523e5a066 resourceVersion: "25603" uid: a9fc087c-4c2f-4e60-8f53-96dad421a8a7 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-16T22:09:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"39a3d8ba-ff0e-4528-a3c2-60c371c2beb2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T22:09:53Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T22:45:53Z" name: cluster-image-registry-operator-dockercfg-6v8s5 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 39a3d8ba-ff0e-4528-a3c2-60c371c2beb2 resourceVersion: "25485" uid: 44487ae6-e385-4de9-9f65-67809b89aab4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T22:09:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a6ff6916-c79e-4581-802c-8447f882200d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T22:09:53Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T22:45:53Z" name: default-dockercfg-7h2k4 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: a6ff6916-c79e-4581-802c-8447f882200d resourceVersion: "25463" uid: 1826252e-2ab2-4214-b48d-7686b3642723 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T22:09:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a468d0f3-c638-444a-b41d-c4d0009c7dec"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T22:09:56Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T22:45:57Z" name: deployer-dockercfg-8cgmd namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: a468d0f3-c638-444a-b41d-c4d0009c7dec resourceVersion: "25610" uid: 84783597-3383-448f-b688-78259a09c65e type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:583e6cade5a6172e52676b4b81db7b901f41cbba0ec023ba11721863402b6bf0 creationTimestamp: "2026-04-16T22:09:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T22:09:33Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1747" uid: 45cb0993-cda1-46b5-8612-3c19c1652334 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T22:16:09Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: be144dfc-55ca-40c5-b0ec-bcaf7bcacaf0 service.beta.openshift.io/expiry: "2028-04-15T22:16:09Z" creationTimestamp: "2026-04-16T22:16:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"be144dfc-55ca-40c5-b0ec-bcaf7bcacaf0"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T22:16:10Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: be144dfc-55ca-40c5-b0ec-bcaf7bcacaf0 resourceVersion: "7866" uid: daeea7d2-a8b9-40db-9e54-b1f3fa91c34c type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-16T22:09:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T22:09:33Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1744" uid: 9eef5d1e-a205-4696-a289-d1c0271018f4 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-16T22:09:31Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-16T22:09:31Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1627" uid: 39295c1c-bbf9-450c-ae52-07fdebc6cc92 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-16T22:09:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f758192a-524d-4985-bd0d-3d1ace423196"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T22:09:53Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T22:45:53Z" name: node-ca-dockercfg-vpmb5 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: f758192a-524d-4985-bd0d-3d1ace423196 resourceVersion: "25476" uid: 19344394-68af-4a1c-b3c4-e0a489f04e91 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-16T22:09:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2464202c-169f-4556-bc4c-49e94df5606d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T22:09:53Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T22:45:53Z" name: pruner-dockercfg-6wtdn namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 2464202c-169f-4556-bc4c-49e94df5606d resourceVersion: "25470" uid: 71cfc69d-e00a-497c-b9c6-37f546c8ba29 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-16T22:09:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f2e301de-e14b-49d9-9fd9-9a1f599ba833"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T22:09:53Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T22:45:53Z" name: registry-dockercfg-8tzbx namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: f2e301de-e14b-49d9-9fd9-9a1f599ba833 resourceVersion: "25453" uid: 77dff7a3-2da0-4e96-81f4-f754352ce7c5 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "33538"