--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T14:20:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cc4d7795-2a42-4255-aaf9-324cd3c04fbf"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:21:00Z" name: builder-dockercfg-4cdpp namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: cc4d7795-2a42-4255-aaf9-324cd3c04fbf resourceVersion: "4004" uid: 7ccc544f-937e-4f96-98a0-0bed7126e4bd type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-24T14:20:54Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:20:54Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8cb8cace-065d-45ac-97e7-ea96ae332aaa"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:54Z" name: cluster-image-registry-operator-dockercfg-8svgw namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 8cb8cace-065d-45ac-97e7-ea96ae332aaa resourceVersion: "3391" uid: fed1d455-483c-4150-bd11-562fbfaee4df type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T14:20:54Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:20:54Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cb03a250-a5c5-4982-ba21-9422d345e2b0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:54Z" name: default-dockercfg-tr94l namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: cb03a250-a5c5-4982-ba21-9422d345e2b0 resourceVersion: "3392" uid: 147aec8e-0980-403c-8615-752f7965db3d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T14:20:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0cf2af4e-a0de-4beb-bcd3-72c2759193a9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:21:00Z" name: deployer-dockercfg-srff5 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 0cf2af4e-a0de-4beb-bcd3-72c2759193a9 resourceVersion: "4001" uid: 50248c50-25b1-43c6-8d3f-1ffc5c5b181d type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:c72ca4f2871294a795b39b09799d4663dade1457bacc4d680575d15de98afddf creationTimestamp: "2026-04-24T14:20:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-24T14:20:16Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1914" uid: 65c1ffc3-ea44-436d-a25c-ac21f76ddb2b type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T14:26:49Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: ec4ebfeb-1677-40c7-855b-7414ba937948 service.beta.openshift.io/expiry: "2028-04-23T14:26:49Z" creationTimestamp: "2026-04-24T14:26:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"ec4ebfeb-1677-40c7-855b-7414ba937948"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T14:26:50Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: ec4ebfeb-1677-40c7-855b-7414ba937948 resourceVersion: "7910" uid: a0afd9a3-c430-40bc-a067-424aa74110fd type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-24T14:20:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-24T14:20:16Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1913" uid: 38d1ad60-c615-4ebe-a536-3722568f3349 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-24T14:20:12Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-24T14:20:12Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1722" uid: d0261900-d0e4-498b-8e8d-7b46b1545e04 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-24T14:20:54Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:20:54Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c40ee965-12cb-4c6f-a1f1-14ab35176e7a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:54Z" name: node-ca-dockercfg-6brmq namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: c40ee965-12cb-4c6f-a1f1-14ab35176e7a resourceVersion: "3394" uid: e1b4460c-351e-4282-9f63-a6886584f002 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-24T14:20:54Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:20:54Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ba3b4921-8b82-42f4-b9c1-b8699ea4e871"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:54Z" name: pruner-dockercfg-55hlm namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: ba3b4921-8b82-42f4-b9c1-b8699ea4e871 resourceVersion: "3397" uid: 4de3202d-2c18-4279-a202-4eff5b9c8157 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-24T14:20:54Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:20:54Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b75f3446-fba4-4dd1-b95c-e9b64a7f24e5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:54Z" name: registry-dockercfg-tpm4v namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: b75f3446-fba4-4dd1-b95c-e9b64a7f24e5 resourceVersion: "3407" uid: 1c1778a4-993b-4e94-b172-a452cf49c3fd type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21541"