--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T21:25:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b48376e5-bc8a-45b3-bb9a-95bd1aa18f58"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:25:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:25:10Z" name: builder-dockercfg-64llw namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: b48376e5-bc8a-45b3-bb9a-95bd1aa18f58 resourceVersion: "4240" uid: a794661a-34a3-47b7-953b-65902e44e9b1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-24T21:25:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:25:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"96b78a6f-1b2d-4b94-8777-3b4e5a21b72e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:25:04Z" name: cluster-image-registry-operator-dockercfg-9vw47 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 96b78a6f-1b2d-4b94-8777-3b4e5a21b72e resourceVersion: "3619" uid: 98b49c32-174a-4128-88d4-94618bbef32b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T21:25:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:25:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"29451c61-1dad-4f15-8221-5e80f39c9f45"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:25:04Z" name: default-dockercfg-ccplr namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 29451c61-1dad-4f15-8221-5e80f39c9f45 resourceVersion: "3620" uid: a9a5bb50-3cc9-4b5f-bb3c-644c7d96b71a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T21:25:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"31b56a5e-876c-4909-b4d4-c26c715e07e8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:25:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:25:10Z" name: deployer-dockercfg-2x54n namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 31b56a5e-876c-4909-b4d4-c26c715e07e8 resourceVersion: "4238" uid: 3c665595-fa95-4b4b-a4ad-2b12eae34bef type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:55ca482330fba81996ae66c6f5c0e6e513bd6273d84478c61d2dedcb5a1ac257 creationTimestamp: "2026-04-24T21:24:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-24T21:24:52Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "3117" uid: 912ee8ce-591a-40d2-97e4-707a86c55506 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T21:27:59Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 21ee02cc-88e4-404d-a8ed-bd811a1fe898 service.beta.openshift.io/expiry: "2028-04-23T21:27:59Z" creationTimestamp: "2026-04-24T21:28:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"21ee02cc-88e4-404d-a8ed-bd811a1fe898"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T21:28:00Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 21ee02cc-88e4-404d-a8ed-bd811a1fe898 resourceVersion: "7018" uid: 7f6d3986-6e51-4881-a48f-572c0c47e520 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-24T21:24:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-24T21:24:52Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "3116" uid: ca89b1e3-46b6-427d-8e94-577a2aa0b537 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-24T21:24:12Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-24T21:24:12Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1701" uid: d38c5ea3-7f6c-4dd3-95e2-1768ef7f268c type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-24T21:25:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:25:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b08c059c-74f8-4b6a-93c5-6c007261a405"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:25:04Z" name: node-ca-dockercfg-zq2fn namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: b08c059c-74f8-4b6a-93c5-6c007261a405 resourceVersion: "3624" uid: e5fa8a8f-8b03-4f3c-b45c-d267d7aeb54b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-24T21:25:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:25:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"19c77fc7-6f9a-47ad-b3bb-f8c2f8397f8f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:25:04Z" name: pruner-dockercfg-6drpw namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 19c77fc7-6f9a-47ad-b3bb-f8c2f8397f8f resourceVersion: "3632" uid: 7ecb4c68-4bbe-4532-906a-05e6279f367e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-24T21:25:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:25:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"172d7e23-1a4e-4bdc-b4cc-177c4a92b5d0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:25:04Z" name: registry-dockercfg-ttx96 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 172d7e23-1a4e-4bdc-b4cc-177c4a92b5d0 resourceVersion: "3634" uid: 7c76a975-bd29-4192-b310-6c3938237f59 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "20525"