--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T20:08:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7da09cce-fef9-4223-8fed-a5a526c3a327"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T20:08:52Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:44:52Z" name: builder-dockercfg-dqfxn namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 7da09cce-fef9-4223-8fed-a5a526c3a327 resourceVersion: "25940" uid: 4491166f-b102-43b9-8e4a-12eabd3e3c83 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE4OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-16T20:08:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4f1b15a9-3d8e-45f3-95f6-8b415154e1cd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T20:08:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:44:46Z" name: cluster-image-registry-operator-dockercfg-rbq2t namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 4f1b15a9-3d8e-45f3-95f6-8b415154e1cd resourceVersion: "25751" uid: 2465fd03-70c9-4de2-9800-13dc7fb2c124 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T20:08:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ab49d373-061a-4db8-8931-546ca48a287c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T20:08:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:44:46Z" name: default-dockercfg-5jhdd namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: ab49d373-061a-4db8-8931-546ca48a287c resourceVersion: "25742" uid: 0d26b5f1-86b5-4b79-81ab-67f936568693 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T20:08:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"11b24cee-50a2-4988-9fe4-fa704912818f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T20:08:52Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:44:52Z" name: deployer-dockercfg-nps96 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 11b24cee-50a2-4988-9fe4-fa704912818f resourceVersion: "25924" uid: f3b3921a-0825-4ba6-8ed2-65057b3a1f47 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:7368cde0fce7bd4e17113987f83ab3e63f88c422ab6771830efb79ec2bf42b40 creationTimestamp: "2026-04-16T20:07:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T20:07:44Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1796" uid: 5170633d-7932-4a28-b39a-a66662745b81 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T20:14:23Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 67072099-2f6b-4856-a448-39c8e4f60c7a service.beta.openshift.io/expiry: "2028-04-15T20:14:23Z" creationTimestamp: "2026-04-16T20:14:24Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"67072099-2f6b-4856-a448-39c8e4f60c7a"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T20:14:24Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 67072099-2f6b-4856-a448-39c8e4f60c7a resourceVersion: "7637" uid: da73d033-b144-4d92-b804-8f0922ef76e2 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-16T20:07:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T20:07:44Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1794" uid: b715feee-766c-4d2a-9b3e-f798925317c7 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-16T20:07:42Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-16T20:07:42Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1655" uid: e4ad552b-49aa-4638-a547-38e1e80a217a type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-16T20:08:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ce4aa346-2fb8-4f34-99e1-3c83dc3cae9f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T20:08:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:44:46Z" name: node-ca-dockercfg-mlz62 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: ce4aa346-2fb8-4f34-99e1-3c83dc3cae9f resourceVersion: "25727" uid: 385f0de5-450b-4d36-bfd3-bf81ae4a81e9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-16T20:08:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e119fe67-4f22-4177-b3d5-e5168ee6d9a7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T20:08:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:44:46Z" name: pruner-dockercfg-9xm9b namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: e119fe67-4f22-4177-b3d5-e5168ee6d9a7 resourceVersion: "25747" uid: 4cd9c884-d4e0-4863-a1dd-f37e47fe881b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-16T20:08:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cd0f3743-4081-4c5b-b48a-db203d83799b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T20:08:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:44:46Z" name: registry-dockercfg-kmdps namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: cd0f3743-4081-4c5b-b48a-db203d83799b resourceVersion: "25739" uid: ff7e3cd9-e351-4312-bd66-af1ad058fef3 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "40025"