--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T17:38:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6a154f42-c7f5-4a18-81f3-4e9318a60a1d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:38:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T17:38:15Z" name: builder-dockercfg-wbl95 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 6a154f42-c7f5-4a18-81f3-4e9318a60a1d resourceVersion: "3819" uid: c8303dcf-1158-4897-b642-f0b323355625 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-16T17:38:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"31770545-48d0-467b-af1d-6ca99415e08a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:38:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T17:38:10Z" name: cluster-image-registry-operator-dockercfg-6qk9l namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 31770545-48d0-467b-af1d-6ca99415e08a resourceVersion: "3221" uid: 496f1d98-054e-4f6e-ba72-88281bf60aa1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T17:38:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d23db19e-e155-4e2a-a8f3-89ce30c3c46b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:38:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T17:38:10Z" name: default-dockercfg-9ff4k namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: d23db19e-e155-4e2a-a8f3-89ce30c3c46b resourceVersion: "3238" uid: f69a62dd-bc0d-43cc-9d2c-ffb05fe64c03 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T17:38:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"46d47c97-c520-49fb-b202-12c22e46e4cc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:38:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T17:38:15Z" name: deployer-dockercfg-7s4rp namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 46d47c97-c520-49fb-b202-12c22e46e4cc resourceVersion: "3812" uid: 91eec1d4-4cb8-45b2-b287-df9b6028e46d type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:aeb91ebc4512466529443a46f5530475374ca03b079eb9ba7f3164a8e172b85b creationTimestamp: "2026-04-16T17:37:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T17:37:36Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "2001" uid: 92d971b7-a0a5-4da6-baea-af09be05a9d4 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T17:43:52Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 059c9de9-91e7-4bee-b0a6-a770c858bf24 service.beta.openshift.io/expiry: "2028-04-15T17:43:52Z" creationTimestamp: "2026-04-16T17:43:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"059c9de9-91e7-4bee-b0a6-a770c858bf24"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T17:43:52Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 059c9de9-91e7-4bee-b0a6-a770c858bf24 resourceVersion: "7822" uid: b141a182-e34e-45cc-b2c2-8ee01d75386e type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-16T17:37:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T17:37:36Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1999" uid: 780b27d2-a11f-42fd-81f0-bc42e3160941 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-16T17:37:33Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-16T17:37:33Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1701" uid: a3babea7-e2a3-4a5a-82e3-8b1f383abffc type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-16T17:38:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"dc04e551-2e49-4ee3-b52a-75a383617c60"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:38:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T17:38:10Z" name: node-ca-dockercfg-q52x8 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: dc04e551-2e49-4ee3-b52a-75a383617c60 resourceVersion: "3241" uid: c33971df-e808-4b9d-bef1-d5b0248e122b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-16T17:38:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"61bc8b82-25bc-4cc4-8da8-0e671101b31c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:38:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T17:38:10Z" name: pruner-dockercfg-5ffmh namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 61bc8b82-25bc-4cc4-8da8-0e671101b31c resourceVersion: "3243" uid: 1df18d65-898f-4b0d-92f7-b25a7528416f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-16T17:38:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c6f7b5aa-0743-4ca4-9800-f5cfde66cb20"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:38:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T17:38:10Z" name: registry-dockercfg-vf8ds namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: c6f7b5aa-0743-4ca4-9800-f5cfde66cb20 resourceVersion: "3258" uid: 02caf6c8-9f5c-4b9f-84e0-99e57e450575 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "20462"