--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T18:17:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:17:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2bfe9002-577f-4aeb-a60d-0d4de9b71d84"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:17:36Z" name: builder-dockercfg-gxcrp namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 2bfe9002-577f-4aeb-a60d-0d4de9b71d84 resourceVersion: "4167" uid: b5a25291-0382-4262-8bdc-7df24ed2fff4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-22T18:17:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"63c41595-93e7-415e-a5a6-19c2e41e925f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:17:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:17:31Z" name: cluster-image-registry-operator-dockercfg-x8njp namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 63c41595-93e7-415e-a5a6-19c2e41e925f resourceVersion: "3578" uid: ea869755-d4f3-4d3e-aea8-7320a82bcb39 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T18:17:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f6fedbb0-4406-46b1-9e28-1146a5bc9a9d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:17:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:17:31Z" name: default-dockercfg-jv488 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: f6fedbb0-4406-46b1-9e28-1146a5bc9a9d resourceVersion: "3579" uid: 4d857c5d-8485-4054-8520-6f8ab14615b1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T18:17:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:17:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bddb7370-05f7-4ab4-94ee-96abc68029bd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:17:36Z" name: deployer-dockercfg-trpsj namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: bddb7370-05f7-4ab4-94ee-96abc68029bd resourceVersion: "4176" uid: 6f40e10d-9e78-477a-8f0e-ce4b8b7f1c92 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:55a8c6f8ededfbadafbd979b70105a610641be5f545e27221c468934c6c49d3d creationTimestamp: "2026-04-22T18:16:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T18:16:52Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1955" uid: 420093f2-8df6-4eed-9bd1-f0c11ec74823 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T18:23:02Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 0d7cdc3d-8b90-4a33-a69f-00fe78ab97b0 service.beta.openshift.io/expiry: "2028-04-21T18:23:02Z" creationTimestamp: "2026-04-22T18:23:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"0d7cdc3d-8b90-4a33-a69f-00fe78ab97b0"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T18:23:03Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 0d7cdc3d-8b90-4a33-a69f-00fe78ab97b0 resourceVersion: "7748" uid: 38d9173d-6a78-45cb-a021-2dd887774c85 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-22T18:16:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T18:16:52Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1953" uid: 05b1f418-7f6b-4e39-b789-a442bf5f5e95 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-22T18:16:49Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-22T18:16:49Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1737" uid: 0dca48a5-a10d-457d-a002-a1f1921f06f2 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-22T18:17:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0debd158-048b-4c87-a4f7-df260018c78b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:17:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:17:31Z" name: node-ca-dockercfg-r6fxt namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 0debd158-048b-4c87-a4f7-df260018c78b resourceVersion: "3583" uid: 1b57b567-eb32-4963-af5f-4846a067cf8c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-22T18:17:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a78e21aa-7941-4d20-a86b-e3002cec9126"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:17:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:17:31Z" name: pruner-dockercfg-wjmhx namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: a78e21aa-7941-4d20-a86b-e3002cec9126 resourceVersion: "3591" uid: 2e31c7b7-5f54-4925-9954-321d0aa09fda type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-22T18:17:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"02c7f035-4312-4a4a-9f98-131e34ecba96"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:17:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:17:31Z" name: registry-dockercfg-r4mpc namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 02c7f035-4312-4a4a-9f98-131e34ecba96 resourceVersion: "3592" uid: cd40eefb-629f-466d-abd1-a9619a9f2e9a type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "11171"