--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T18:33:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"727f8173-e394-4dc4-af90-fd17051e1d48"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:33:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:45:07Z" name: builder-dockercfg-w8spc namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 727f8173-e394-4dc4-af90-fd17051e1d48 resourceVersion: "38450" uid: 69e672d4-431b-40ba-9c7b-e1da994d34a7 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-22T18:33:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"222f887e-0ac3-4dab-aa9b-4419933a71ec"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:33:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:45:02Z" name: cluster-image-registry-operator-dockercfg-897kr namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 222f887e-0ac3-4dab-aa9b-4419933a71ec resourceVersion: "38298" uid: 76ed4f2f-30a9-4007-949d-4deb41b70c03 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T18:33:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2c29b755-e3fa-443b-86b5-e91657cda4db"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:33:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:45:02Z" name: default-dockercfg-b7k8j namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 2c29b755-e3fa-443b-86b5-e91657cda4db resourceVersion: "38289" uid: fd0e8f2b-03f6-4984-9613-c7843f23368e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T18:33:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6e73a9a2-8e87-4ee0-b329-a8a768452624"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:33:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:45:07Z" name: deployer-dockercfg-lhdwd namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 6e73a9a2-8e87-4ee0-b329-a8a768452624 resourceVersion: "38470" uid: 3066039b-fe4b-41c1-afb1-64409f74b9f6 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:b37930a70370a2b4a378a768aabdc027804a0e325002c808278d1fdeac6596bc creationTimestamp: "2026-04-22T18:32:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T18:32:16Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "2046" uid: ee5fa00e-45ef-4a08-98ec-a6c05e9fc309 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T18:38:18Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 8442e710-d6e8-4645-bcd0-e42eef7807d3 service.beta.openshift.io/expiry: "2028-04-21T18:38:18Z" creationTimestamp: "2026-04-22T18:38:19Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"8442e710-d6e8-4645-bcd0-e42eef7807d3"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T18:38:19Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 8442e710-d6e8-4645-bcd0-e42eef7807d3 resourceVersion: "7703" uid: fc209427-e419-4b46-84ef-baceb51ab4c8 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-22T18:32:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T18:32:16Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "2045" uid: c837063d-73b8-40bf-9d3d-96426ef0c12b type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-22T18:32:12Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-22T18:32:12Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1665" uid: 4a39a0d7-349f-4723-97fe-13837f3758ee type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-22T18:33:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2d788ac7-c026-40dc-86bf-1002432e7169"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:33:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:45:02Z" name: node-ca-dockercfg-789rh namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 2d788ac7-c026-40dc-86bf-1002432e7169 resourceVersion: "38299" uid: 055412d6-9ccb-419a-84ec-d2ce91990323 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-22T18:33:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"333f1e8e-f676-496e-aac9-518e22aa0cbc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:33:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:45:02Z" name: pruner-dockercfg-rzkdq namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 333f1e8e-f676-496e-aac9-518e22aa0cbc resourceVersion: "38286" uid: a0f591c7-e5b8-4461-b3f8-545dc4b826de type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-22T18:33:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f8808e75-0509-4a26-a1a7-c9479baa815a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:33:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:45:02Z" name: registry-dockercfg-vvpgg namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: f8808e75-0509-4a26-a1a7-c9479baa815a resourceVersion: "38285" uid: c4e8e415-e267-4534-bb70-7db733ac68c3 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "39271"