--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-23T13:28:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T13:28:06Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"13bc16bc-1ce0-42bf-bdd5-ecbe9539fa7e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T13:28:06Z" name: builder-dockercfg-9r7pw namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 13bc16bc-1ce0-42bf-bdd5-ecbe9539fa7e resourceVersion: "3921" uid: 4c00c121-c331-4fc0-947f-b974e7e49c4d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-23T13:28:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T13:28:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"940e8c0e-d3c0-4b2e-b143-7b30345d15a6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T13:28:01Z" name: cluster-image-registry-operator-dockercfg-9zn7x namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 940e8c0e-d3c0-4b2e-b143-7b30345d15a6 resourceVersion: "3128" uid: 38809064-61d3-46f2-91c7-b570dd2cf4c9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-23T13:28:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T13:28:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ffa6356e-74b6-4049-b89e-2dc852160b55"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T13:28:01Z" name: default-dockercfg-dtxqq namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: ffa6356e-74b6-4049-b89e-2dc852160b55 resourceVersion: "3135" uid: 43af4aed-56bc-4c1f-aae9-7feef20f1870 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-23T13:28:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T13:28:06Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c290d0e3-be37-4e7d-b2a1-4596738bd67b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T13:28:06Z" name: deployer-dockercfg-lp7vz namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: c290d0e3-be37-4e7d-b2a1-4596738bd67b resourceVersion: "3919" uid: d19de0b2-6587-4e3c-927c-d04983bc8d80 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:5818ea73f4fa0cf360664972ceb19aa05d10cd02f7e065d89bcc0c9f1eb599fd creationTimestamp: "2026-04-23T13:27:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-23T13:27:33Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1817" uid: f8e3b35a-0336-4dcd-9b46-76403158a5b1 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-22T13:33:48Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: f727c620-9768-4778-b540-8a8990bb983b service.beta.openshift.io/expiry: "2028-04-22T13:33:48Z" creationTimestamp: "2026-04-23T13:33:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"f727c620-9768-4778-b540-8a8990bb983b"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-23T13:33:48Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: f727c620-9768-4778-b540-8a8990bb983b resourceVersion: "7735" uid: 98d03a8f-e7ae-4f67-a008-7504c6d607b4 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-23T13:27:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-23T13:27:33Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1816" uid: a6f4df22-59d5-444c-8431-243e057871fd type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-23T13:27:31Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-23T13:27:31Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1690" uid: c3f5e769-d5c1-49dc-9cea-99a2aefe1bdb type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-23T13:28:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T13:28:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9fe9e658-8a56-4c8d-accc-07f62874df9a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T13:28:01Z" name: node-ca-dockercfg-6vjsf namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 9fe9e658-8a56-4c8d-accc-07f62874df9a resourceVersion: "3142" uid: aded2d8b-d50b-423a-8e82-1453f9a04d3d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-23T13:28:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T13:28:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a3384342-9f03-4e1e-ab49-1d2b41591bc2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T13:28:01Z" name: pruner-dockercfg-2xqr4 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: a3384342-9f03-4e1e-ab49-1d2b41591bc2 resourceVersion: "3144" uid: 87d824a3-180e-48e9-8a68-f6429b208645 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-23T13:28:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T13:28:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"40ed59af-bdeb-4297-8e82-f538dc2c0523"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T13:28:01Z" name: registry-dockercfg-fxpfk namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 40ed59af-bdeb-4297-8e82-f538dc2c0523 resourceVersion: "3171" uid: 6778530d-ea71-44dc-af4a-b86e59f37d9d type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "37819"