--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T14:11:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"23df67f3-fed0-440b-ad26-d4d154b5b62e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:11:40Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:47:40Z" name: builder-dockercfg-gbrk5 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 23df67f3-fed0-440b-ad26-d4d154b5b62e resourceVersion: "25244" uid: aafddd6a-22ec-499c-aa47-c68491431473 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE4OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-22T14:11:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"31cd859b-5ca9-456a-8b46-1d99d297c2fb"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:11:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:47:35Z" name: cluster-image-registry-operator-dockercfg-zq5kw namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 31cd859b-5ca9-456a-8b46-1d99d297c2fb resourceVersion: "25037" uid: e2ea0328-7813-479c-a94d-bc515c359c06 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T14:11:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e041e3a0-4d16-4cdc-9475-8b3af513962c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:11:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:47:35Z" name: default-dockercfg-76sl8 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: e041e3a0-4d16-4cdc-9475-8b3af513962c resourceVersion: "25064" uid: fc693e31-3c58-4f4d-9185-0c85f98ae49a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T14:11:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cb06b8d6-026c-4f16-a781-152ba7fa5395"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:11:40Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:47:40Z" name: deployer-dockercfg-52rnx namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: cb06b8d6-026c-4f16-a781-152ba7fa5395 resourceVersion: "25238" uid: 64be0a8f-f46d-43fb-9c3d-9029fdd6e70e type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:da2aff57a20fd82440b88bb062b14821845d3198f54aed2701a7cc55bee39159 creationTimestamp: "2026-04-22T14:11:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T14:11:27Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1850" uid: b706f664-e489-4601-a3d6-b8e1915d997b type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T14:17:49Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 2575fd78-a05a-4bf1-8c09-5a73e5ac5c68 service.beta.openshift.io/expiry: "2028-04-21T14:17:49Z" creationTimestamp: "2026-04-22T14:17:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"2575fd78-a05a-4bf1-8c09-5a73e5ac5c68"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T14:17:50Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 2575fd78-a05a-4bf1-8c09-5a73e5ac5c68 resourceVersion: "7748" uid: 6abb9c38-df65-4a71-913c-52de3cf11fa4 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-22T14:11:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T14:11:27Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1847" uid: fba26fde-919c-4017-8b87-1022cc94fdf0 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-22T14:11:23Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-22T14:11:23Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1624" uid: e512edb4-5504-4f88-bf02-614b9fae2b4d type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-22T14:11:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"abf29d1d-2b5c-4703-ab0d-6929d0bfe93a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:11:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:47:35Z" name: node-ca-dockercfg-vwwdk namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: abf29d1d-2b5c-4703-ab0d-6929d0bfe93a resourceVersion: "25056" uid: 1d5a338d-fe89-4e83-9af8-e92e1bbe4b4a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-22T14:11:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9f8b7ad5-dfbb-46be-af15-a557cef99590"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:11:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:47:35Z" name: pruner-dockercfg-l96lk namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 9f8b7ad5-dfbb-46be-af15-a557cef99590 resourceVersion: "25048" uid: bcce6540-ef26-4dec-8431-cebc29add5d2 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-22T14:11:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0da5bb00-bace-460f-b156-311717af1413"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:11:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:47:35Z" name: registry-dockercfg-x72w4 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 0da5bb00-bace-460f-b156-311717af1413 resourceVersion: "25049" uid: 30f79294-59ea-4ca0-a7e0-a2c87150cdc6 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "40158"