--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T21:14:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1b326860-567f-423d-a209-49875cadcda8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:14:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:14:21Z" name: builder-dockercfg-2s8sp namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 1b326860-567f-423d-a209-49875cadcda8 resourceVersion: "4168" uid: 5c343b40-7733-4e20-87a0-9fe2ed444ac7 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-24T21:14:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:14:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9726b7b7-eccc-4495-96e9-bc6affc66005"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:14:15Z" name: cluster-image-registry-operator-dockercfg-gbrdb namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 9726b7b7-eccc-4495-96e9-bc6affc66005 resourceVersion: "3576" uid: 7b44b619-70e3-4ae1-8066-6679fbf6b52e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T21:14:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:14:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ea441833-ac18-4b27-848b-ba1d4b8aa52d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:14:15Z" name: default-dockercfg-zl989 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: ea441833-ac18-4b27-848b-ba1d4b8aa52d resourceVersion: "3577" uid: 3911401f-276c-4d75-ae9e-c3f7b21f0796 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T21:14:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ecd321d5-7296-4ce8-8025-31a23fe6938f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:14:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:14:21Z" name: deployer-dockercfg-4n67z namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: ecd321d5-7296-4ce8-8025-31a23fe6938f resourceVersion: "4170" uid: 02b465a6-31c7-4e6a-a5c9-bf64ae1e835b type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:6f0e60735bb209f1f69fe73ae0285dc341766c2c91a28160aa7fb3e83abaf092 creationTimestamp: "2026-04-24T21:13:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-24T21:13:29Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1871" uid: 9746a162-e70f-49fc-abe9-be9683f30953 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T21:17:18Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: d40a97af-0a62-455f-b37c-9cc317be9db4 service.beta.openshift.io/expiry: "2028-04-23T21:17:18Z" creationTimestamp: "2026-04-24T21:17:19Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"d40a97af-0a62-455f-b37c-9cc317be9db4"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T21:17:19Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: d40a97af-0a62-455f-b37c-9cc317be9db4 resourceVersion: "7007" uid: c37d15a3-65bd-4763-b519-33428e87f331 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-24T21:13:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-24T21:13:29Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1869" uid: 5ce9ee8f-7fb8-4215-aa1c-534683566ecb type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-24T21:13:27Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-24T21:13:27Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1702" uid: ba708319-ba09-4a76-8539-bd2b1427a3ac type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-24T21:14:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:14:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e77fe754-b005-45c0-8aba-fb0d90cb5e28"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:14:15Z" name: node-ca-dockercfg-jrbtm namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: e77fe754-b005-45c0-8aba-fb0d90cb5e28 resourceVersion: "3585" uid: b6947ef6-6dbc-4ad1-88f7-844390e7b1ea type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-24T21:14:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:14:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"13cfe9d6-31bc-43d8-8a45-9833797f1b01"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:14:15Z" name: pruner-dockercfg-c89t2 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 13cfe9d6-31bc-43d8-8a45-9833797f1b01 resourceVersion: "3587" uid: 25840d7f-3e99-408a-bfb9-ceb72abd1131 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-24T21:14:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:14:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"79de80e4-37fc-493c-9378-6dbac222620c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:14:15Z" name: registry-dockercfg-dqkgc namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 79de80e4-37fc-493c-9378-6dbac222620c resourceVersion: "3595" uid: 0ea741ef-8bc7-47ce-8eb2-1b50772daa1c type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "20606"