--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T20:07:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"91dc95eb-09db-4e15-9c65-856b78829a0b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:07:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:43:27Z" name: builder-dockercfg-rrkpb namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 91dc95eb-09db-4e15-9c65-856b78829a0b resourceVersion: "44100" uid: 1d39a00e-7198-4d7b-803d-31e47e760f25 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-20T20:07:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ab63837d-24db-46ea-86c8-6893ab0cd8fb"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:07:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:43:22Z" name: cluster-image-registry-operator-dockercfg-bgszr namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: ab63837d-24db-46ea-86c8-6893ab0cd8fb resourceVersion: "43915" uid: 5e5669c4-9140-43a0-8d3f-76b6ea89ee70 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T20:07:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"329b6a75-dce7-463e-acb8-e22e61109702"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:07:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:43:22Z" name: default-dockercfg-25c8z namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 329b6a75-dce7-463e-acb8-e22e61109702 resourceVersion: "43913" uid: ac78e5db-e5b7-4341-b8d3-9e3543c9736e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T20:07:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5ae6a151-dfb7-4769-ac41-d74529a3e6c8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:07:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:43:27Z" name: deployer-dockercfg-99b9z namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 5ae6a151-dfb7-4769-ac41-d74529a3e6c8 resourceVersion: "44088" uid: 31cb5569-bd16-4b3e-a300-62631b81a71f type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:26935e1736068487840ba56ff9a6665af7db6697d14e65b1c58ca23abeb36ae8 creationTimestamp: "2026-04-20T20:07:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-20T20:07:05Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1867" uid: e809138a-9e3f-48c8-896d-49c9eaaebc1b type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T20:13:21Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 4a3bf92b-6a41-429d-aac8-c400bfc732c8 service.beta.openshift.io/expiry: "2028-04-19T20:13:21Z" creationTimestamp: "2026-04-20T20:13:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"4a3bf92b-6a41-429d-aac8-c400bfc732c8"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T20:13:22Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 4a3bf92b-6a41-429d-aac8-c400bfc732c8 resourceVersion: "7689" uid: 542ae5ad-21e8-48a5-9886-ac9d84c1f74f type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-20T20:07:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-20T20:07:05Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1865" uid: 18d4d397-2cf9-49a2-83fd-3f53704c67db type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-20T20:07:02Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-20T20:07:02Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1635" uid: f0e2b746-320b-4e3f-888c-a43c4853e9c2 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-20T20:07:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ee3879bc-dd40-466a-9560-f4f9780d9e1c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:07:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:43:22Z" name: node-ca-dockercfg-x9bmk namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: ee3879bc-dd40-466a-9560-f4f9780d9e1c resourceVersion: "43912" uid: 0bab0855-9812-43df-9a00-df7da09428c7 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-20T20:07:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f685ee74-88e5-4389-979f-2d9a83705162"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:07:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:43:22Z" name: pruner-dockercfg-6kcln namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: f685ee74-88e5-4389-979f-2d9a83705162 resourceVersion: "43901" uid: b1172a12-0ed9-483e-b950-21dae14e6996 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-20T20:07:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bff8428a-01aa-459e-885c-2ab2d58c1e98"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:07:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:43:22Z" name: registry-dockercfg-rb8vs namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: bff8428a-01aa-459e-885c-2ab2d58c1e98 resourceVersion: "43905" uid: c2d49c93-26c3-42be-9fe9-317885422a72 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "47005"