--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T21:23:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4e7ba61f-c7b8-41ff-974e-973cb4d4ac4d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:23:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:59:05Z" name: builder-dockercfg-9c47z namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 4e7ba61f-c7b8-41ff-974e-973cb4d4ac4d resourceVersion: "25509" uid: 6277aeb3-5099-4829-bef7-a1d3cb2450bc type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-24T21:22:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b1b616c1-d035-4b67-9aca-a89f63b6f133"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:22:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:59:00Z" name: cluster-image-registry-operator-dockercfg-fz5jp namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: b1b616c1-d035-4b67-9aca-a89f63b6f133 resourceVersion: "25339" uid: f8cf10cb-b582-487a-a438-95ee937cf199 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T21:23:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"30eee9ee-a969-4951-a58a-2cb4315d2ca5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:23:00Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:59:00Z" name: default-dockercfg-xvcrz namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 30eee9ee-a969-4951-a58a-2cb4315d2ca5 resourceVersion: "25350" uid: ec2f3b42-2197-406a-ae5b-9158cfb904a1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T21:23:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"00f12f2b-9620-4d72-86ef-436547a4ee56"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:23:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:59:05Z" name: deployer-dockercfg-vldj5 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 00f12f2b-9620-4d72-86ef-436547a4ee56 resourceVersion: "25521" uid: 6f92749d-eebf-4ad9-a45c-67ea665aa748 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:f5e9135bddaa5c61da5ace3842f68b245eecf7cc26d006780ca0b123fe9d8187 creationTimestamp: "2026-04-24T21:22:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-24T21:22:52Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1974" uid: e26dd0c6-0be4-4d7c-9a51-27d59b51f988 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T21:29:24Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 4015b643-9913-4b5b-b271-5b52ac7fffeb service.beta.openshift.io/expiry: "2028-04-23T21:29:24Z" creationTimestamp: "2026-04-24T21:29:24Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"4015b643-9913-4b5b-b271-5b52ac7fffeb"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T21:29:24Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 4015b643-9913-4b5b-b271-5b52ac7fffeb resourceVersion: "7899" uid: 64073adb-e3e9-451c-b4e1-8df3e2a24376 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-24T21:22:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-24T21:22:52Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1973" uid: 95d04fdd-c3d7-4191-8535-b9442a3b3cf9 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-24T21:22:46Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-24T21:22:46Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1815" uid: 185f8cbc-41ce-46e7-afed-41692c94f5b4 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-24T21:22:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e7d9d781-eb64-4a3b-b43e-60ad4d849fde"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:22:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:59:00Z" name: node-ca-dockercfg-mmf58 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: e7d9d781-eb64-4a3b-b43e-60ad4d849fde resourceVersion: "25348" uid: cdf3ad07-9819-47ad-8ee3-b4853996668b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-24T21:23:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fa3fa862-ac8f-43ee-a593-9a1c4695e3ce"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:23:00Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:59:00Z" name: pruner-dockercfg-khmxs namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: fa3fa862-ac8f-43ee-a593-9a1c4695e3ce resourceVersion: "25347" uid: ee946d40-af60-49b6-8d5f-ea39e230795d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-24T21:22:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"42f3ab8d-55b3-4aa1-a1a4-e7ddcc90874e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:22:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:59:00Z" name: registry-dockercfg-ptvss namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 42f3ab8d-55b3-4aa1-a1a4-e7ddcc90874e resourceVersion: "25342" uid: c97285e2-9979-4756-9516-b8a9f5f81155 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "33556"