--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-21T14:52:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"55f20b23-0995-4bbf-9d24-c03a96730728"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:52:13Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T15:28:14Z" name: builder-dockercfg-d5m6n namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 55f20b23-0995-4bbf-9d24-c03a96730728 resourceVersion: "38810" uid: 93565384-a521-4192-9661-b8ad26b7ec9c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-21T14:52:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"94b7e95e-0707-4d07-9381-923e15d3d93a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:52:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T15:28:09Z" name: cluster-image-registry-operator-dockercfg-tf9n6 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 94b7e95e-0707-4d07-9381-923e15d3d93a resourceVersion: "38648" uid: 834e2744-4fc1-4e64-9fd3-8072abeb53ed type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-21T14:52:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f57e73e3-79f8-406d-856f-d245b558fc7d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:52:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T15:28:09Z" name: default-dockercfg-86bsg namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: f57e73e3-79f8-406d-856f-d245b558fc7d resourceVersion: "38632" uid: b260f50b-d4f2-46f9-a6d6-efac79943875 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-21T14:52:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f29e2d2f-2df9-492b-b217-965f40c57c52"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:52:13Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T15:28:14Z" name: deployer-dockercfg-sj98h namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: f29e2d2f-2df9-492b-b217-965f40c57c52 resourceVersion: "38803" uid: edbd117b-7752-4b80-933e-805c16ebf5b7 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:f384def8152651be22cd2f0b97b5a3fccf54fde1d320adb8d1c8a3dd1bd67ccc creationTimestamp: "2026-04-21T14:51:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-21T14:51:47Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1878" uid: 043f9e48-55e4-4d9c-be13-c813fec864a4 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T14:58:04Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 445e2beb-50c9-409b-a15a-8101771eb1c5 service.beta.openshift.io/expiry: "2028-04-20T14:58:04Z" creationTimestamp: "2026-04-21T14:58:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"445e2beb-50c9-409b-a15a-8101771eb1c5"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T14:58:05Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 445e2beb-50c9-409b-a15a-8101771eb1c5 resourceVersion: "7765" uid: 24e640a2-f005-4af5-b375-4feefd806684 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-21T14:51:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-21T14:51:47Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1876" uid: 94ee08fd-616d-41d4-885a-efeb52a6b495 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-21T14:51:45Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-21T14:51:45Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1699" uid: e9911353-da27-4033-842f-94cc12fd077f type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-21T14:52:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4de24e2c-bdfa-4a6d-acc6-aa555588338d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:52:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T15:28:09Z" name: node-ca-dockercfg-zsff7 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 4de24e2c-bdfa-4a6d-acc6-aa555588338d resourceVersion: "38645" uid: d1a81000-e528-491c-86d1-904e8d78d7d7 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-21T14:52:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ed55967d-fb3f-4d01-b15b-70f611d446c4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:52:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T15:28:09Z" name: pruner-dockercfg-l4rqp namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: ed55967d-fb3f-4d01-b15b-70f611d446c4 resourceVersion: "38637" uid: 7c6c5e2a-f9c9-4d23-9d21-67eb926cbd87 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-21T14:52:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"957903b1-6e3a-4aae-be3b-9c970ca5dde1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:52:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T15:28:09Z" name: registry-dockercfg-47f52 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 957903b1-6e3a-4aae-be3b-9c970ca5dde1 resourceVersion: "38654" uid: d2d5fff8-7fb3-42d7-917b-a7a6ec451ba6 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "46615"