--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T20:24:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7c092532-7758-408d-afe7-dd8dd477ff65"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T20:24:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T21:00:28Z" name: builder-dockercfg-5bvk8 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 7c092532-7758-408d-afe7-dd8dd477ff65 resourceVersion: "44098" uid: f307be76-ea7d-4850-b9be-9fc06145149f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE4OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-16T20:24:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5d4b50e5-1b8a-4fdd-94b0-6d9eba86ae7d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T20:24:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T21:00:22Z" name: cluster-image-registry-operator-dockercfg-8qpzz namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 5d4b50e5-1b8a-4fdd-94b0-6d9eba86ae7d resourceVersion: "43858" uid: d6023449-f3a4-4655-9f26-4a89a740ba93 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T20:24:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6eaca89c-3a7e-409b-9445-f7eef47c4c5d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T20:24:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T21:00:22Z" name: default-dockercfg-t5hxx namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 6eaca89c-3a7e-409b-9445-f7eef47c4c5d resourceVersion: "43852" uid: cf2cef33-505f-47c7-80cb-7b7f5de35454 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T20:24:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"78675f24-ce8f-4089-b47e-206824dc210d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T20:24:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T21:00:28Z" name: deployer-dockercfg-g5zjv namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 78675f24-ce8f-4089-b47e-206824dc210d resourceVersion: "44091" uid: cee796d0-f260-4431-add9-a8e097b578e1 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:750d13508208aebbbf152420491c58ffc5c45124706e27656560f69f8cdf13ad creationTimestamp: "2026-04-16T20:24:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T20:24:15Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "2640" uid: 234998a8-8c31-45af-96b2-881a53007d0b type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T20:30:04Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 7249a545-b819-4ad9-ba0f-7ebf44058dfa service.beta.openshift.io/expiry: "2028-04-15T20:30:04Z" creationTimestamp: "2026-04-16T20:30:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"7249a545-b819-4ad9-ba0f-7ebf44058dfa"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T20:30:05Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 7249a545-b819-4ad9-ba0f-7ebf44058dfa resourceVersion: "7754" uid: 31d11c88-5834-4f6b-93ed-68a478ac7d38 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-16T20:24:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T20:24:15Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "2634" uid: 2f5f5a2e-969f-4ac8-a7af-50f10d8fde8f type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-16T20:23:46Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-16T20:23:46Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1605" uid: dbcbe51d-53c8-4c1c-b307-5681b6098bef type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-16T20:24:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d663ae3e-4937-48cb-96b6-991b4f86d626"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T20:24:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T21:00:22Z" name: node-ca-dockercfg-6lc9h namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: d663ae3e-4937-48cb-96b6-991b4f86d626 resourceVersion: "43848" uid: 2e4155c6-5296-400c-be14-4e4468eee93a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-16T20:24:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cac65132-a2c9-4643-b8ca-dc2ad50b3e81"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T20:24:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T21:00:22Z" name: pruner-dockercfg-djgzj namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: cac65132-a2c9-4643-b8ca-dc2ad50b3e81 resourceVersion: "43861" uid: c2553ab0-9adc-4ebd-b95c-4531534dd142 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-16T20:24:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fb8d3fb0-b2c7-4cd0-9e15-1496bc7587e7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T20:24:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T21:00:22Z" name: registry-dockercfg-tj6tv namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: fb8d3fb0-b2c7-4cd0-9e15-1496bc7587e7 resourceVersion: "43847" uid: e7837c9c-ad40-449a-8d32-b5875fa6ecfa type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "46450"