--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T21:12:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"eb09d463-a77e-4590-8176-4165b489ea6d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:12:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:48:15Z" name: builder-dockercfg-bxxgc namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: eb09d463-a77e-4590-8176-4165b489ea6d resourceVersion: "25398" uid: f03a70be-7f7c-4c58-a833-16c0a043f444 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE4OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-24T21:12:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"be221015-a849-41f8-ba3c-188bf532a710"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:12:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:48:09Z" name: cluster-image-registry-operator-dockercfg-btd5c namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: be221015-a849-41f8-ba3c-188bf532a710 resourceVersion: "25190" uid: a7f3a8f3-d45c-438c-a479-4d3e99ed81f3 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T21:12:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e5e14e6e-acfc-4115-b598-fb3a82969f5d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:12:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:48:09Z" name: default-dockercfg-6zw76 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: e5e14e6e-acfc-4115-b598-fb3a82969f5d resourceVersion: "25196" uid: d354b633-4365-46c2-89e0-f66fc8ba4b40 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T21:12:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"696bad41-81fd-4a84-a1b7-664c409f6f55"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:12:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:48:15Z" name: deployer-dockercfg-rcbrt namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 696bad41-81fd-4a84-a1b7-664c409f6f55 resourceVersion: "25392" uid: 189e79ac-51de-45dc-a95f-0317606c59d7 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:4a5ba7d8629488ea0ab254c3f5e3c9ff8d697383596627aedac2552ef4f7c207 creationTimestamp: "2026-04-24T21:11:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-24T21:11:37Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1837" uid: 725752dc-374d-48c8-826a-eb8603bd9f73 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T21:17:43Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: deda4eef-c562-4033-9a79-55a6d98134f4 service.beta.openshift.io/expiry: "2028-04-23T21:17:43Z" creationTimestamp: "2026-04-24T21:17:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"deda4eef-c562-4033-9a79-55a6d98134f4"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T21:17:43Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: deda4eef-c562-4033-9a79-55a6d98134f4 resourceVersion: "7633" uid: 786beac7-def2-46a0-b16e-f1b7a9074bb1 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-24T21:11:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-24T21:11:37Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1836" uid: 84ff41cf-0ac0-4614-81b8-80f52fa73c59 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-24T21:11:35Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-24T21:11:35Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1671" uid: 6a241769-0038-49b9-99cd-f70f57b20d46 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-24T21:12:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e07d7137-092c-40c9-be59-a371776464e2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:12:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:48:09Z" name: node-ca-dockercfg-btscm namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: e07d7137-092c-40c9-be59-a371776464e2 resourceVersion: "25202" uid: c98dcdf6-eef8-4ada-9a63-1651cc0dd966 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-24T21:12:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3a1e47fb-309e-4dcf-be9d-aad32245c63a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:12:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:48:09Z" name: pruner-dockercfg-7h284 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 3a1e47fb-309e-4dcf-be9d-aad32245c63a resourceVersion: "25184" uid: ed429d75-c422-44bf-8f06-fb3a8dc14089 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-24T21:12:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"64de8be0-4936-4b1e-8175-6bea23523c9a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:12:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:48:09Z" name: registry-dockercfg-bc8qn namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 64de8be0-4936-4b1e-8175-6bea23523c9a resourceVersion: "25183" uid: 41b23192-155a-4e8f-8837-1b4f853ef448 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "42101"