--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T19:15:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c40102dd-d4ad-4b43-9f84-ca12b9ac9a43"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:15:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T19:51:08Z" name: builder-dockercfg-7jjtv namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: c40102dd-d4ad-4b43-9f84-ca12b9ac9a43 resourceVersion: "41745" uid: 4e5e8582-250f-4f4b-9e1a-2d1d9af35f4c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-16T19:15:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4e9de55e-2303-4c54-976a-1d5513f1cfb0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:15:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T19:51:03Z" name: cluster-image-registry-operator-dockercfg-w5csm namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 4e9de55e-2303-4c54-976a-1d5513f1cfb0 resourceVersion: "41511" uid: 27f2c7d3-5cfd-4d80-87a4-de1618edc604 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T19:15:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3e544bdf-0ce7-47e6-b873-143e1aef5192"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:15:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T19:51:03Z" name: default-dockercfg-6zdmm namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 3e544bdf-0ce7-47e6-b873-143e1aef5192 resourceVersion: "41499" uid: ef40c205-a7f5-43d6-9c17-d8c69fb98637 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T19:15:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"683af848-a583-4393-a81f-d7acca25c02e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:15:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T19:51:08Z" name: deployer-dockercfg-lks4t namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 683af848-a583-4393-a81f-d7acca25c02e resourceVersion: "41760" uid: 93ecf995-ad43-4e9f-891c-e6f11754ebd9 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:07a8e151bfe24d625a88345014fe80cd46fa0c574bf0e34842a8862b0aa806a8 creationTimestamp: "2026-04-16T19:14:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T19:14:39Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1756" uid: ddae2310-70d4-4727-9387-ed6507c8a83d type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T19:18:55Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 7501a373-12bb-4b98-8196-9196468e6730 service.beta.openshift.io/expiry: "2028-04-15T19:18:55Z" creationTimestamp: "2026-04-16T19:18:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"7501a373-12bb-4b98-8196-9196468e6730"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T19:18:56Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 7501a373-12bb-4b98-8196-9196468e6730 resourceVersion: "7256" uid: 375b985e-e634-44a8-a168-2bbce053005e type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-16T19:14:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T19:14:39Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1744" uid: 5d034503-3009-46bc-9144-1fe9b40006fb type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-16T19:14:37Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-16T19:14:37Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1644" uid: 9e68147d-4288-4fd0-bd0d-875468ac9c0a type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-16T19:15:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cdd7b383-01fa-4f04-845c-4f6b70c908b5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:15:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T19:51:03Z" name: node-ca-dockercfg-fsnql namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: cdd7b383-01fa-4f04-845c-4f6b70c908b5 resourceVersion: "41505" uid: 9511238b-81e2-4b9c-a7ce-b6cfefac0cb4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-16T19:15:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b4807485-3c1f-4d95-adfd-8bd1a442d7fc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:15:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T19:51:03Z" name: pruner-dockercfg-548wl namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: b4807485-3c1f-4d95-adfd-8bd1a442d7fc resourceVersion: "41520" uid: efb49778-80e5-4e18-8cc9-b229cc490a26 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-16T19:15:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bfcb48fc-b823-46ad-957f-82bb732b0cfa"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:15:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T19:51:03Z" name: registry-dockercfg-bjmd7 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: bfcb48fc-b823-46ad-957f-82bb732b0cfa resourceVersion: "41521" uid: 260e106d-425d-4a67-ad74-1eae698ffeaf type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "46854"