--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T21:34:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T21:34:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c1ddce06-02c8-4587-bad3-c479a1d03fc0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T21:34:10Z" name: builder-dockercfg-ngbfq namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: c1ddce06-02c8-4587-bad3-c479a1d03fc0 resourceVersion: "3991" uid: ff8188f4-62dd-4041-bb35-088c9d2ccf10 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-17T21:34:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8cdd9d0b-fe73-4d05-83f2-fe42bdd5c44e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T21:34:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T21:34:05Z" name: cluster-image-registry-operator-dockercfg-tdb28 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 8cdd9d0b-fe73-4d05-83f2-fe42bdd5c44e resourceVersion: "3281" uid: efbf2610-3370-4640-a015-e189b9362b22 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T21:34:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2f8cff32-662f-4ba8-808c-8bc56da6fd65"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T21:34:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T21:34:05Z" name: default-dockercfg-b45xd namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 2f8cff32-662f-4ba8-808c-8bc56da6fd65 resourceVersion: "3287" uid: c45ff93a-addc-4834-ae23-5844cb2e5887 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T21:34:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T21:34:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"87786b78-7796-4004-8294-962b7866ec8d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T21:34:10Z" name: deployer-dockercfg-kjh87 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 87786b78-7796-4004-8294-962b7866ec8d resourceVersion: "3986" uid: b20acf49-8df4-432a-9f64-9925e61c70fc type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a2e487ce256d6e49a149d72ca6b1554daef430cb559b10feb351bd25efb39bdc creationTimestamp: "2026-04-17T21:33:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T21:33:41Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1971" uid: fb9a0b92-9059-4348-a004-99c68f55225e type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T21:37:29Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: f355a3e4-c286-4959-98cd-765f9b2e7d97 service.beta.openshift.io/expiry: "2028-04-16T21:37:29Z" creationTimestamp: "2026-04-17T21:37:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"f355a3e4-c286-4959-98cd-765f9b2e7d97"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T21:37:29Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: f355a3e4-c286-4959-98cd-765f9b2e7d97 resourceVersion: "6854" uid: d13dcb09-2b47-49cc-a281-1c69c48752ae type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-17T21:33:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T21:33:41Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1969" uid: c3616400-37cc-46aa-98d0-1c47afea1c65 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-17T21:33:37Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-17T21:33:37Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1611" uid: 5322212f-e246-4305-b20b-094da6415d84 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-17T21:34:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"536064d8-a5a7-4067-9457-78da020b677f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T21:34:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T21:34:05Z" name: node-ca-dockercfg-9pl4m namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 536064d8-a5a7-4067-9457-78da020b677f resourceVersion: "3292" uid: 33b19b8c-7d39-49a2-b40b-be13b8f64dd3 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-17T21:34:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1905e2da-fa3a-448e-8de0-82b7ac1bf4d1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T21:34:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T21:34:05Z" name: pruner-dockercfg-mdql6 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 1905e2da-fa3a-448e-8de0-82b7ac1bf4d1 resourceVersion: "3301" uid: 2c6c6665-da5d-401e-ad74-2c741869da52 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-17T21:34:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2d40f590-898c-4c29-953c-30c588cb13e5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T21:34:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T21:34:05Z" name: registry-dockercfg-lmbh2 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 2d40f590-898c-4c29-953c-30c588cb13e5 resourceVersion: "3302" uid: 7fe1e881-13cb-418d-b3fb-5c1dc1ea5c3f type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "40900"