--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T17:50:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T17:50:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3109abc0-603b-4804-86d0-92a025c6e984"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:50:22Z" name: builder-dockercfg-99p7x namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 3109abc0-603b-4804-86d0-92a025c6e984 resourceVersion: "3723" uid: 27a42386-5051-4894-be23-93669317ad7c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-22T17:50:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"dc7c921a-681e-4c83-a673-28565971aa47"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:50:16Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T17:50:17Z" name: cluster-image-registry-operator-dockercfg-wfs7k namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: dc7c921a-681e-4c83-a673-28565971aa47 resourceVersion: "3080" uid: 7d159be9-8afe-4f2e-9704-2fad10690dcb type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T17:50:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3979c8f6-1198-4cc8-a81d-c3d3e42a27b1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:50:16Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T17:50:17Z" name: default-dockercfg-g2jzm namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 3979c8f6-1198-4cc8-a81d-c3d3e42a27b1 resourceVersion: "3099" uid: 5bfd09e4-4619-4ed2-97ca-f74210c0dbbd type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T17:50:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T17:50:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"03a632cc-2147-431c-b089-b89f588754b3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:50:22Z" name: deployer-dockercfg-hshcv namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 03a632cc-2147-431c-b089-b89f588754b3 resourceVersion: "3726" uid: 65bfd47d-6056-45b0-827f-df9f8a56dc57 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:e1bf5dc1b3e272fa37223100004d61103f87eda7ed5b0611553fadda26bd80de creationTimestamp: "2026-04-22T17:49:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T17:49:52Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "2014" uid: 7be290cf-87f2-4354-a3aa-3349c4caf531 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T17:53:50Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: e3b80636-2453-43e1-b7a1-7ea54bbfd4d0 service.beta.openshift.io/expiry: "2028-04-21T17:53:50Z" creationTimestamp: "2026-04-22T17:53:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"e3b80636-2453-43e1-b7a1-7ea54bbfd4d0"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T17:53:50Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: e3b80636-2453-43e1-b7a1-7ea54bbfd4d0 resourceVersion: "7062" uid: 9ef09869-45d5-496e-97f9-7e600e3b4d72 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-22T17:49:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T17:49:52Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "2012" uid: 4796f27d-0726-4beb-84e7-ca2020af6849 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-22T17:49:49Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-22T17:49:49Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1780" uid: 74749b69-d7d0-4d7c-8e03-9c11618742b9 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-22T17:50:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"26231905-dea1-41d2-95b8-9456a49efa58"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:50:16Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T17:50:17Z" name: node-ca-dockercfg-ghrmk namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 26231905-dea1-41d2-95b8-9456a49efa58 resourceVersion: "3101" uid: 9a90de87-6ad4-4a1f-ade6-36ee75de4dcd type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-22T17:50:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2ecacf3f-76f5-4dcc-a895-58e606d26cc6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:50:16Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T17:50:17Z" name: pruner-dockercfg-pg42p namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 2ecacf3f-76f5-4dcc-a895-58e606d26cc6 resourceVersion: "3103" uid: c929647b-92ae-4899-8531-aa3318d55b7a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-22T17:50:17Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T17:50:17Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2ec32432-5f3b-46d0-8e5a-3bba14fd7d04"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:50:17Z" name: registry-dockercfg-tlhcz namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 2ec32432-5f3b-46d0-8e5a-3bba14fd7d04 resourceVersion: "3104" uid: ae426859-b690-4808-a81d-4aef1c348bdf type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "37992"