--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T18:06:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"251c1589-8e08-4405-a1b8-22e04771fc1f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:06:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:42:46Z" name: builder-dockercfg-6wdp2 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 251c1589-8e08-4405-a1b8-22e04771fc1f resourceVersion: "26386" uid: 8d9c9397-c7e3-4a8d-9116-68993df3a377 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE4OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-16T18:06:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5b64509b-e8d9-4ef3-8fd8-1d308f5b9621"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:06:40Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:42:41Z" name: cluster-image-registry-operator-dockercfg-g7b5n namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 5b64509b-e8d9-4ef3-8fd8-1d308f5b9621 resourceVersion: "26230" uid: bb60d1c8-8184-4b3d-b779-cf306e56ea05 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T18:06:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e81b2cb5-3168-41a1-b8bd-4a05030d27ea"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:06:40Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:42:41Z" name: default-dockercfg-tfw6d namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: e81b2cb5-3168-41a1-b8bd-4a05030d27ea resourceVersion: "26213" uid: 4597f5ca-5d06-4f57-ae55-e8d3e1ed93ba type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T18:06:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b322fef4-7bc3-4003-8f9d-cd6b337fa41a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:06:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:42:46Z" name: deployer-dockercfg-fmlv5 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: b322fef4-7bc3-4003-8f9d-cd6b337fa41a resourceVersion: "26380" uid: 90e38162-0c32-4a04-89c2-b98ed64b53ac type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:cf0921d73b39aa417439323ea2504b41d8be8ca28dc93bc63b62368c63fdad5f creationTimestamp: "2026-04-16T18:06:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T18:06:08Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1912" uid: 51b02684-7d53-48a9-a23d-87d80aeac566 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T18:10:33Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: f67b1703-0303-4ea3-9b34-52569efe293c service.beta.openshift.io/expiry: "2028-04-15T18:10:33Z" creationTimestamp: "2026-04-16T18:10:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"f67b1703-0303-4ea3-9b34-52569efe293c"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T18:10:34Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: f67b1703-0303-4ea3-9b34-52569efe293c resourceVersion: "7266" uid: e5e6210a-c54c-4094-bbba-96396d68c7c3 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-16T18:06:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T18:06:08Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1910" uid: cb8214bc-97a1-43e6-91ed-65b7f77a4c44 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-16T18:06:05Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-16T18:06:05Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1656" uid: bb9da369-7cd7-4a17-8ee0-68ac2c33095e type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-16T18:06:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ad153b7e-99b5-41af-a27c-6d198ff2e47d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:06:40Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:42:41Z" name: node-ca-dockercfg-2b5w5 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: ad153b7e-99b5-41af-a27c-6d198ff2e47d resourceVersion: "26219" uid: 58345135-dbcb-4dbb-9f1f-f0a4a0d98f9d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-16T18:06:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9bf7cc42-90c6-48fa-9591-fb26fbd14c4e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:06:40Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:42:41Z" name: pruner-dockercfg-6czwq namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 9bf7cc42-90c6-48fa-9591-fb26fbd14c4e resourceVersion: "26228" uid: 74e7e819-8f1e-48d9-9565-c7182ce9ab8d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-16T18:06:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4f96611d-6c4d-4df4-89cb-80e714ed8f1c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:06:40Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:42:41Z" name: registry-dockercfg-v2fsg namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 4f96611d-6c4d-4df4-89cb-80e714ed8f1c resourceVersion: "26227" uid: 46b0a99b-af66-4148-bcc0-b98ef033b549 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "33237"