--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T14:12:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c6e65777-da83-4047-a77a-85f1d744f294"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:12:00Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:12:11Z" name: builder-dockercfg-975mf namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: c6e65777-da83-4047-a77a-85f1d744f294 resourceVersion: "3979" uid: 5b1667cb-e63b-4721-810b-4b4ff453ce0f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-22T14:11:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0213f3eb-95ed-42d2-9ef5-a68621b84731"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:11:57Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:12:10Z" name: cluster-image-registry-operator-dockercfg-w5dsj namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 0213f3eb-95ed-42d2-9ef5-a68621b84731 resourceVersion: "3805" uid: 05a583e4-b5fd-4e61-8901-c270d52f57af type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T14:11:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e0b34f37-a26d-4604-9f99-1badc908c7e9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:11:57Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:12:10Z" name: default-dockercfg-pwfsj namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: e0b34f37-a26d-4604-9f99-1badc908c7e9 resourceVersion: "3806" uid: 3bd94105-8766-48af-a254-6d564b04205d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T14:12:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c2115095-0a4b-417b-ab6c-caeddcfb76b6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:12:00Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:12:11Z" name: deployer-dockercfg-s92hl namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: c2115095-0a4b-417b-ab6c-caeddcfb76b6 resourceVersion: "3981" uid: df1a3e35-5c29-4dbf-bebc-fc4115c72867 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:e08d6e1d1912098808e0ddd79601bb5e7312c84a4d0a68bff3e07cc4acdb22e3 creationTimestamp: "2026-04-22T14:12:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T14:12:09Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "3684" uid: ec0b2e81-1de0-4e1a-ac06-8d0cd6efac03 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T14:17:53Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: fa7e8948-b76e-4fe2-8c2c-7c0756fab84a service.beta.openshift.io/expiry: "2028-04-21T14:17:53Z" creationTimestamp: "2026-04-22T14:17:54Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"fa7e8948-b76e-4fe2-8c2c-7c0756fab84a"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T14:17:54Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: fa7e8948-b76e-4fe2-8c2c-7c0756fab84a resourceVersion: "7842" uid: d8d70645-50c4-42cf-9eff-dd07ed41cd16 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-22T14:12:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T14:12:09Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "3683" uid: 5bdb995e-d989-40c0-88ca-87dcbee83e3b type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-22T14:11:25Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-22T14:11:25Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1840" uid: 9370a613-c38a-419e-89ce-6b60562ac3f6 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-22T14:11:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"abc5c117-b836-4e78-82f8-878fd6bdebbd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:11:57Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:12:10Z" name: node-ca-dockercfg-fkrmd namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: abc5c117-b836-4e78-82f8-878fd6bdebbd resourceVersion: "3808" uid: 86af0842-9313-43b0-bcf0-767a35a4f89a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-22T14:12:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9c118f12-b9fb-4819-9fe9-1e9505e52632"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:12:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:12:13Z" name: pruner-dockercfg-7k5nd namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 9c118f12-b9fb-4819-9fe9-1e9505e52632 resourceVersion: "4053" uid: 26b1ff9e-0fa1-4ea7-a784-0c09bab7cfb4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-22T14:12:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d4a70e9a-7607-46ba-b6f4-9b5bbcc54cf9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:12:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:12:13Z" name: registry-dockercfg-xbchn namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: d4a70e9a-7607-46ba-b6f4-9b5bbcc54cf9 resourceVersion: "4054" uid: 6df2c320-432f-4ac7-86e4-cda6850ab623 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21074"