--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T21:23:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b5f4fc3d-9d3c-41ff-8d9d-36aa4ef80095"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:23:38Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:59:39Z" name: builder-dockercfg-ntzwf namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: b5f4fc3d-9d3c-41ff-8d9d-36aa4ef80095 resourceVersion: "34979" uid: e3e7ce13-2d22-48d9-ba39-2872100e5cd0 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-24T21:23:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bc0e7832-bb53-4b8e-ae35-3a205dc54685"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:23:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:59:34Z" name: cluster-image-registry-operator-dockercfg-422rt namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: bc0e7832-bb53-4b8e-ae35-3a205dc54685 resourceVersion: "34815" uid: 43f7d1b8-8a1a-4df1-bd2b-159bd0e2e730 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T21:23:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b7920007-9ae7-4202-b933-8a0e41c6ef28"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:23:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:59:34Z" name: default-dockercfg-8mfkr namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: b7920007-9ae7-4202-b933-8a0e41c6ef28 resourceVersion: "34808" uid: 7036b287-e5a9-4f7b-9c60-b53840591782 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T21:23:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"36982365-95d1-4ee0-81bd-53464c146c16"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:23:38Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:59:39Z" name: deployer-dockercfg-zmrtc namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 36982365-95d1-4ee0-81bd-53464c146c16 resourceVersion: "34987" uid: 99dec643-3b01-4841-bc67-ba7131c44cf8 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:8fcad7cdb6c6fa5241c42fb6049254a93f5cb037984757d1e76189e6ce8c205f creationTimestamp: "2026-04-24T21:22:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-24T21:22:56Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1853" uid: ddab09c8-7a88-4904-bab9-b42f3f503940 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T21:27:21Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: d2da47f9-810b-4921-9113-98996a5c630b service.beta.openshift.io/expiry: "2028-04-23T21:27:21Z" creationTimestamp: "2026-04-24T21:27:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"d2da47f9-810b-4921-9113-98996a5c630b"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T21:27:22Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: d2da47f9-810b-4921-9113-98996a5c630b resourceVersion: "7204" uid: e380814f-54a9-40e7-b651-8ab4098fdd82 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-24T21:22:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-24T21:22:56Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1851" uid: 8679a3a8-c190-40d9-a3a2-d6c95103ecb2 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-24T21:22:52Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-24T21:22:52Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1607" uid: d73b78ef-bd32-4857-b6e5-0e47bda2c812 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-24T21:23:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"186afbf3-197a-4648-baf7-0f15703ef6eb"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:23:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:59:34Z" name: node-ca-dockercfg-cklfj namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 186afbf3-197a-4648-baf7-0f15703ef6eb resourceVersion: "34806" uid: 8b44fbd1-30f4-40bd-b051-2184f343043b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-24T21:23:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"51618a8e-3eca-4689-88a4-c94b70f01a4a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:23:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:59:34Z" name: pruner-dockercfg-jvwks namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 51618a8e-3eca-4689-88a4-c94b70f01a4a resourceVersion: "34814" uid: a9f6d30e-52ad-4654-9a53-d8cc1e384a32 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-24T21:23:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cca267e2-fa00-44b0-b4cd-611313f814bb"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:23:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:59:34Z" name: registry-dockercfg-qbk7c namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: cca267e2-fa00-44b0-b4cd-611313f814bb resourceVersion: "34811" uid: 46a081e8-028f-4823-a543-ab1e2eb43246 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "44021"