--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T06:59:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"77c91a97-def1-45d8-b241-a10e96dd2a92"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T06:59:33Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T07:35:52Z" name: builder-dockercfg-59cfm namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 77c91a97-def1-45d8-b241-a10e96dd2a92 resourceVersion: "38855" uid: afea4d87-6460-45bb-a28e-30c01e4c8960 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-20T06:59:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d9d2a7ce-a173-4df7-b36f-9b9b442d5077"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T06:59:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T07:35:50Z" name: cluster-image-registry-operator-dockercfg-mtmzs namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: d9d2a7ce-a173-4df7-b36f-9b9b442d5077 resourceVersion: "38675" uid: cf627ce6-42f2-4d6c-bc0e-98add083ba34 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T06:59:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ca87561f-ef73-4de4-9c1d-dbfded75899d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T06:59:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T07:35:50Z" name: default-dockercfg-pmd2p namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: ca87561f-ef73-4de4-9c1d-dbfded75899d resourceVersion: "38653" uid: e7fa6a9f-1a11-4e6e-adcb-03e1ca2c1ce3 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T06:59:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7ac24e97-09e7-478f-8bdd-49b83133dac5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T06:59:33Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T07:35:52Z" name: deployer-dockercfg-hkkrz namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 7ac24e97-09e7-478f-8bdd-49b83133dac5 resourceVersion: "38826" uid: 4db02e69-b675-44c8-9feb-9325f43c850e type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:3bc99e1f1aae7dc38b7030a0ca0cf27ad7f5ab88b058187902ab904d3a38bdc3 creationTimestamp: "2026-04-20T06:59:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-20T06:59:49Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "3599" uid: 0256e268-d15f-4b0d-8e5d-a025f31170ae type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T07:03:32Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: cead33c7-3eaa-4275-a04f-bf8fbb4bcb84 service.beta.openshift.io/expiry: "2028-04-19T07:03:32Z" creationTimestamp: "2026-04-20T07:03:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"cead33c7-3eaa-4275-a04f-bf8fbb4bcb84"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T07:03:32Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: cead33c7-3eaa-4275-a04f-bf8fbb4bcb84 resourceVersion: "7115" uid: a5169c89-73d9-4cbd-8ce5-531e96a56e35 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-20T06:59:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-20T06:59:49Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "3597" uid: 882799c6-c618-4935-aaf3-3b766d5e6674 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-20T06:59:18Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-20T06:59:18Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1638" uid: a66a7aff-c3a9-4586-bc4e-46817c76f1bb type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-20T06:59:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a7e79122-5072-4cd0-aa44-e60179d3e483"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T06:59:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T07:35:50Z" name: node-ca-dockercfg-fwvms namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: a7e79122-5072-4cd0-aa44-e60179d3e483 resourceVersion: "38749" uid: 9871c18a-e7fe-4883-a24d-5c39b965c61f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-20T06:59:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c47f2158-d2a5-4a8c-8cfd-3bd02deae7a4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T06:59:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T07:35:53Z" name: pruner-dockercfg-fzxvx namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: c47f2158-d2a5-4a8c-8cfd-3bd02deae7a4 resourceVersion: "38906" uid: 2c265e6f-95a6-4a2b-a7fc-7f35a5a9162a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-20T06:59:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"763ff28b-4771-40a9-a51a-b95517465bfc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T06:59:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T07:35:53Z" name: registry-dockercfg-w2xpz namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 763ff28b-4771-40a9-a51a-b95517465bfc resourceVersion: "38886" uid: 0b00aa63-fc56-4710-8e62-bc975a390225 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "43277"