--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-19T15:20:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a54eeaf3-0648-4b1c-b001-cd1902fa07ae"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-19T15:20:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-19T15:56:35Z" name: builder-dockercfg-nk9tl namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: a54eeaf3-0648-4b1c-b001-cd1902fa07ae resourceVersion: "44536" uid: fa62caec-4b54-403e-81e8-8533ee5a92a6 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-19T15:20:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"474857b4-9690-4981-81c4-2b23bb1cde03"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-19T15:20:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-19T15:56:29Z" name: cluster-image-registry-operator-dockercfg-hws8z namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 474857b4-9690-4981-81c4-2b23bb1cde03 resourceVersion: "44269" uid: 94382fad-4e76-4ca5-a5f4-c248e45b02ad type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-19T15:20:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"40e07c68-7a9d-472e-a90f-1dee4f0c3a51"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-19T15:20:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-19T15:56:29Z" name: default-dockercfg-sm2jv namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 40e07c68-7a9d-472e-a90f-1dee4f0c3a51 resourceVersion: "44267" uid: 76b2aacc-aa05-4c8b-8a8a-92fcc1944f0d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-19T15:20:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2796a54f-f19f-4d21-b28a-9fdf73dbb76d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-19T15:20:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-19T15:56:35Z" name: deployer-dockercfg-g76vk namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 2796a54f-f19f-4d21-b28a-9fdf73dbb76d resourceVersion: "44559" uid: 22930260-3150-40f6-8b01-30c2e7147176 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:8415f4dddcaeb6d0c80e1885de071d44ae255750af58a9093d68b5f0721517b3 creationTimestamp: "2026-04-19T15:20:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-19T15:20:03Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1894" uid: a4604452-f2a6-4a9d-b234-db5e78a50d79 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-18T15:26:04Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 0ad67727-ef9a-41b5-80f9-a509a0e94b85 service.beta.openshift.io/expiry: "2028-04-18T15:26:04Z" creationTimestamp: "2026-04-19T15:26:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"0ad67727-ef9a-41b5-80f9-a509a0e94b85"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-19T15:26:05Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 0ad67727-ef9a-41b5-80f9-a509a0e94b85 resourceVersion: "7596" uid: 1aa72ee4-b666-4707-8906-2bde47a51fbc type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-19T15:20:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-19T15:20:03Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1893" uid: f63cb53b-88c1-4420-b281-18ecb72ef5e5 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-19T15:20:00Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-19T15:20:00Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1679" uid: 730f8247-6bcd-4d12-8f52-17f30b170807 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-19T15:20:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"42346f9f-1a4b-4520-954d-36e56bc1bd26"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-19T15:20:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-19T15:56:29Z" name: node-ca-dockercfg-lqrwl namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 42346f9f-1a4b-4520-954d-36e56bc1bd26 resourceVersion: "44265" uid: c78a15b5-8f28-4f8b-8c50-31f610c6a352 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-19T15:20:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"126e18cc-9af6-4f52-aa87-b3001f8371ad"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-19T15:20:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-19T15:56:29Z" name: pruner-dockercfg-rzhfp namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 126e18cc-9af6-4f52-aa87-b3001f8371ad resourceVersion: "44274" uid: 85c664c5-f461-47c9-ae87-7a27531c5019 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-19T15:20:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"28b1933c-d994-4eda-8fe5-9494b965f1e5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-19T15:20:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-19T15:56:29Z" name: registry-dockercfg-b94dq namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 28b1933c-d994-4eda-8fe5-9494b965f1e5 resourceVersion: "44268" uid: 13b79018-3522-4954-bc6e-20ddc8d81983 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "46468"