--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T21:13:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"50208405-9258-420d-8d28-bf431603702b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:13:56Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:49:56Z" name: builder-dockercfg-tv2jd namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 50208405-9258-420d-8d28-bf431603702b resourceVersion: "25366" uid: e9a53222-c2bd-4381-bff9-459c4ef5f5a2 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-24T21:13:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8c7ce85e-d975-47c6-ad4e-00dbc2f0fb7b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:13:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:49:50Z" name: cluster-image-registry-operator-dockercfg-24qs9 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 8c7ce85e-d975-47c6-ad4e-00dbc2f0fb7b resourceVersion: "25172" uid: 209c7789-7db3-4b0e-8c34-8dd6b47dc5c5 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T21:13:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5bf27383-1b68-4bd4-9f68-cd4c3d9e91a2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:13:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:49:51Z" name: default-dockercfg-ds7bs namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 5bf27383-1b68-4bd4-9f68-cd4c3d9e91a2 resourceVersion: "25208" uid: d696b3ec-ef6c-4c35-a7c1-6a2747472878 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T21:13:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"af1872ad-4d5f-4ed9-95bd-ad0dd055394c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:13:56Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:49:56Z" name: deployer-dockercfg-wf9rg namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: af1872ad-4d5f-4ed9-95bd-ad0dd055394c resourceVersion: "25379" uid: acf8e30d-5d50-4075-a8b9-b667d9e2dcc1 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:b269e16cc4e36cd8b8d53894c3a1d73b64dd120a229ec499f7b0631e546d39bf creationTimestamp: "2026-04-24T21:12:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-24T21:12:46Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1885" uid: 53d86e30-4794-4aac-a003-121758ff1eb9 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T21:17:11Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: c6bbe61e-4b1a-4f2e-8ecd-12c4eeb19b39 service.beta.openshift.io/expiry: "2028-04-23T21:17:11Z" creationTimestamp: "2026-04-24T21:17:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"c6bbe61e-4b1a-4f2e-8ecd-12c4eeb19b39"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T21:17:12Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: c6bbe61e-4b1a-4f2e-8ecd-12c4eeb19b39 resourceVersion: "7068" uid: 16bbf2f0-a6b9-4907-92f0-dd1c49d69b8d type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-24T21:12:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-24T21:12:46Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1883" uid: 895577d8-0b99-433e-9930-29bda85ea42e type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-24T21:12:43Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-24T21:12:43Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1683" uid: d2bb6876-dcb8-4ee8-8783-8daf0183b927 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-24T21:13:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a47ed814-7337-4d00-b2a0-8ff0cc201023"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:13:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:49:51Z" name: node-ca-dockercfg-qxxrn namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: a47ed814-7337-4d00-b2a0-8ff0cc201023 resourceVersion: "25207" uid: 38b110ad-b920-45d8-acff-a7067256be01 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-24T21:13:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"52032c8d-4dbe-4960-aa92-2171e9386376"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:13:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:49:51Z" name: pruner-dockercfg-p6z6c namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 52032c8d-4dbe-4960-aa92-2171e9386376 resourceVersion: "25195" uid: a4374811-5f76-4712-88a3-81edfb75854c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-24T21:13:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9f0f304f-de9f-4993-9ccb-c54058b7137b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:13:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:49:51Z" name: registry-dockercfg-jgvbr namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 9f0f304f-de9f-4993-9ccb-c54058b7137b resourceVersion: "25193" uid: 6fbfc046-c1dc-4502-aba2-0951750b4fbb type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "33835"