--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-21T04:35:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:35:25Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cde85f96-623c-4d2a-b6f2-8067e203c2ac"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T04:35:25Z" name: builder-dockercfg-b8zx6 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: cde85f96-623c-4d2a-b6f2-8067e203c2ac resourceVersion: "4149" uid: 4d6b7744-51a3-42d0-b2c5-eababdd297b8 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE4OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-21T04:35:19Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"34e31ff4-d48e-4d75-819f-c22ace27cca6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T04:35:19Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:35:20Z" name: cluster-image-registry-operator-dockercfg-zms6t namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 34e31ff4-d48e-4d75-819f-c22ace27cca6 resourceVersion: "3550" uid: ef92f136-a2de-4834-bb35-a7e639a9bfb4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-21T04:35:19Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0d72378d-c9ec-421b-bbe2-ea98ce6e8a7d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T04:35:19Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:35:20Z" name: default-dockercfg-m57v9 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 0d72378d-c9ec-421b-bbe2-ea98ce6e8a7d resourceVersion: "3551" uid: 71e370c0-0b5e-4a12-94af-62dc5814c9c4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-21T04:35:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:35:25Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f4fa5728-1d5c-4d10-9b2e-ae5be5cada12"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T04:35:25Z" name: deployer-dockercfg-tzpv4 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: f4fa5728-1d5c-4d10-9b2e-ae5be5cada12 resourceVersion: "4148" uid: 7dd25abf-94f4-4050-a781-2a81221a13f1 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:0c14c6836ed3be0c7d05aa8333be0e38feef8067618eaa538dfc6ea0e4376a49 creationTimestamp: "2026-04-21T04:35:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-21T04:35:07Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "2597" uid: 40e1e251-dc7b-4745-ab95-09c5db320186 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T04:40:55Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 10bb7262-9981-475f-ac02-f0e1189a004c service.beta.openshift.io/expiry: "2028-04-20T04:40:55Z" creationTimestamp: "2026-04-21T04:40:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"10bb7262-9981-475f-ac02-f0e1189a004c"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T04:40:56Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 10bb7262-9981-475f-ac02-f0e1189a004c resourceVersion: "7741" uid: 4eab0fa1-2109-41bf-8d44-28da9c8b317c type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-21T04:35:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-21T04:35:07Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "2594" uid: da169443-4f76-4e11-b00e-a9d054f63202 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-21T04:34:39Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-21T04:34:39Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1658" uid: c314660d-125d-4982-b91c-c5a199e3a0c5 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-21T04:35:19Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7cb52c57-1850-4324-ae89-e1388fd592e9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T04:35:19Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:35:20Z" name: node-ca-dockercfg-jhc9c namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 7cb52c57-1850-4324-ae89-e1388fd592e9 resourceVersion: "3554" uid: 9beb581b-b162-45a8-93dc-cdc8a0efc5ac type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-21T04:35:19Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"daf41f54-d619-458b-86cf-b301899acea5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T04:35:19Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:35:20Z" name: pruner-dockercfg-8fnl9 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: daf41f54-d619-458b-86cf-b301899acea5 resourceVersion: "3557" uid: da0d7d4f-6cc8-4659-9196-5aefe1cf851a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-21T04:35:19Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cc1c0642-ccce-4134-a1c8-eda1877a5d90"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T04:35:19Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:35:20Z" name: registry-dockercfg-nlhzm namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: cc1c0642-ccce-4134-a1c8-eda1877a5d90 resourceVersion: "3571" uid: 1feea362-4288-4897-ab8b-e9012e6c44a6 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "26620"