--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T14:50:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1e107839-fd7b-47db-a301-e9a6d75a2d03"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:50:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T15:26:32Z" name: builder-dockercfg-sq585 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 1e107839-fd7b-47db-a301-e9a6d75a2d03 resourceVersion: "44295" uid: 3e01f002-7a0c-485b-80e5-3a2fb19d2d29 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-20T14:50:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2381959c-73d4-45ab-a06c-7ffb8c106ad1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:50:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T15:26:27Z" name: cluster-image-registry-operator-dockercfg-k64qj namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 2381959c-73d4-45ab-a06c-7ffb8c106ad1 resourceVersion: "44109" uid: d6d0c98b-687a-4e8e-8eee-469b207a555d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T14:50:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5e7d0f76-7962-4727-8436-12ca1056c787"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:50:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T15:26:27Z" name: default-dockercfg-lgn8b namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 5e7d0f76-7962-4727-8436-12ca1056c787 resourceVersion: "44110" uid: 4392cbbd-1f82-4db9-b6cc-aad268d3e5b3 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T14:50:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"44e0f304-25d6-4d39-9426-2ad60779cdef"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:50:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T15:26:32Z" name: deployer-dockercfg-qzqf5 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 44e0f304-25d6-4d39-9426-2ad60779cdef resourceVersion: "44311" uid: bc620940-820a-4be3-8fcf-989b6cfd3758 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:18c2cabe33a45b045fa9b30d4b7c0b6d285514181b9989215e9e5e2e897f477c creationTimestamp: "2026-04-20T14:49:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-20T14:49:57Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1876" uid: 41f85955-3ad8-4889-ab16-605da487672a type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T14:56:10Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 51af42ed-ad7f-4d61-986c-520a64f20587 service.beta.openshift.io/expiry: "2028-04-19T14:56:10Z" creationTimestamp: "2026-04-20T14:56:11Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"51af42ed-ad7f-4d61-986c-520a64f20587"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T14:56:11Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 51af42ed-ad7f-4d61-986c-520a64f20587 resourceVersion: "7735" uid: 7c1aef84-05a4-4e62-91d0-b637dbce5b22 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-20T14:49:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-20T14:49:57Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1868" uid: a0513300-dddc-4a32-a73a-3179dcc02241 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-20T14:49:54Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-20T14:49:54Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1623" uid: 78a1726d-5d76-4078-8713-d97aa8791845 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-20T14:50:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"66cb5a57-98b3-4fce-8711-63fe60e3058b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:50:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T15:26:27Z" name: node-ca-dockercfg-6rxz6 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 66cb5a57-98b3-4fce-8711-63fe60e3058b resourceVersion: "44098" uid: a3a5b9a2-e70a-4770-93f7-d20213f3f148 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-20T14:50:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c4d9e78f-e263-4dfe-9371-b416f1d64a10"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:50:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T15:26:27Z" name: pruner-dockercfg-dvmvn namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: c4d9e78f-e263-4dfe-9371-b416f1d64a10 resourceVersion: "44100" uid: 0d7b4249-edf5-4c0f-ae38-81c31dbf713d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-20T14:50:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4e060234-3cfd-4ea8-a72f-eb51450ec0df"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:50:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T15:26:27Z" name: registry-dockercfg-rrj9j namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 4e060234-3cfd-4ea8-a72f-eb51450ec0df resourceVersion: "44101" uid: fac03cfa-1f09-49f3-9d77-f6afae9e6263 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "45918"