--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T16:28:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6b7cce3c-fa00-4bdf-be19-e7268641c291"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:28:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:28:36Z" name: builder-dockercfg-ddht2 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 6b7cce3c-fa00-4bdf-be19-e7268641c291 resourceVersion: "3799" uid: 54d8372e-174d-4159-8fa4-6e8daf16c8d5 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE4OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-17T16:28:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ec29f2ce-6271-419f-be57-5ef36d811643"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:28:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:28:31Z" name: cluster-image-registry-operator-dockercfg-cvl2g namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: ec29f2ce-6271-419f-be57-5ef36d811643 resourceVersion: "3085" uid: 4a2f6bc3-8fdf-49f5-9efd-100d3daf39cf type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T16:28:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"41744aab-5d1f-41d9-8940-d603d27c7634"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:28:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:28:31Z" name: default-dockercfg-245qz namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 41744aab-5d1f-41d9-8940-d603d27c7634 resourceVersion: "3088" uid: ad02e3ff-2245-428e-a4f9-cf8ac10e415d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T16:28:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"62d2a4a0-d3da-4b34-9b89-b0fd32a1afc4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:28:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:28:36Z" name: deployer-dockercfg-674h8 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 62d2a4a0-d3da-4b34-9b89-b0fd32a1afc4 resourceVersion: "3789" uid: ebe4cd88-a524-4184-b173-61b015947361 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:bd0d0942c77bf4d656b084900829943a2c211cc0831a6af61c8c1390ac72096a creationTimestamp: "2026-04-17T16:28:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T16:28:10Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "2201" uid: 57077ae7-5a59-4c2a-b858-6ac7c2375865 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T16:32:11Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 77c3fbcd-b6d8-43e3-9632-23c289742d39 service.beta.openshift.io/expiry: "2028-04-16T16:32:11Z" creationTimestamp: "2026-04-17T16:32:11Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"77c3fbcd-b6d8-43e3-9632-23c289742d39"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T16:32:11Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 77c3fbcd-b6d8-43e3-9632-23c289742d39 resourceVersion: "7142" uid: 01007002-b271-4904-9dbf-29608be0f888 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-17T16:28:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T16:28:10Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "2200" uid: 3890ae5a-79bb-47a1-8212-5597405f9f53 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-17T16:28:02Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-17T16:28:02Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1838" uid: 1b460d7e-29f4-45d1-b5cd-4f781c25170b type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-17T16:28:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"53b9c3c0-1625-4f24-943b-29db04263b41"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:28:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:28:31Z" name: node-ca-dockercfg-2tf2s namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 53b9c3c0-1625-4f24-943b-29db04263b41 resourceVersion: "3097" uid: a8a22e03-d875-4da4-9ffc-ed94da2c6cb1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-17T16:28:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5c94179a-ccf9-4d27-bb8e-7551ea96498e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:28:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:28:31Z" name: pruner-dockercfg-dbpcr namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 5c94179a-ccf9-4d27-bb8e-7551ea96498e resourceVersion: "3100" uid: 64ddca1e-bae6-4a77-9598-65d68f96fea1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-17T16:28:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"624dbc5a-aed2-41c7-ab02-40d05904c3f2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:28:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:28:31Z" name: registry-dockercfg-psh7p namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 624dbc5a-aed2-41c7-ab02-40d05904c3f2 resourceVersion: "3108" uid: 64c40a9d-0ea1-4076-bc24-b9a0b114e473 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21022"