--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T21:08:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"15cb26cd-491d-4ed0-ae5a-34cc4fc90fbf"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T21:08:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T21:45:11Z" name: builder-dockercfg-zt4gq namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 15cb26cd-491d-4ed0-ae5a-34cc4fc90fbf resourceVersion: "45523" uid: 8aee4388-02c4-4516-884b-08413fc7ec54 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE4OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-20T21:08:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"81c182c1-c75b-486b-8624-2ac341bba4f1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T21:08:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T21:45:09Z" name: cluster-image-registry-operator-dockercfg-jqnth namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 81c182c1-c75b-486b-8624-2ac341bba4f1 resourceVersion: "45340" uid: b0a9a54f-35da-4c56-940a-f4e7c58fad1b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T21:08:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2e4980a8-8be3-4554-a4d4-5438c89ac323"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T21:08:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T21:45:09Z" name: default-dockercfg-rxtfs namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 2e4980a8-8be3-4554-a4d4-5438c89ac323 resourceVersion: "45239" uid: 37bd9be8-31d6-4efb-8c92-274a9b5855aa type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T21:08:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"adbd2ad9-1a9b-42b4-a101-e9ef872cb5e5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T21:08:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T21:45:11Z" name: deployer-dockercfg-2b9p7 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: adbd2ad9-1a9b-42b4-a101-e9ef872cb5e5 resourceVersion: "45499" uid: 19e2f6d7-5080-4d1d-8ab0-ab074e3ed4f5 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:ba917d7cb116fd18469691f1caf54610f195a01eab8bfec1e44f7a35d801cfe6 creationTimestamp: "2026-04-20T21:09:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-20T21:09:09Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "3994" uid: b4f050d4-68ca-43a6-804e-8990b151fd53 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T21:14:21Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: e22c0bc2-f00f-482e-97ce-6af4ac344b70 service.beta.openshift.io/expiry: "2028-04-19T21:14:21Z" creationTimestamp: "2026-04-20T21:14:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"e22c0bc2-f00f-482e-97ce-6af4ac344b70"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T21:14:21Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: e22c0bc2-f00f-482e-97ce-6af4ac344b70 resourceVersion: "7607" uid: 36b501cb-e8cc-442c-9885-670355189157 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-20T21:09:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-20T21:09:08Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "3992" uid: cb2f4456-10a7-488d-b5d9-7e4b261363b3 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-20T21:08:16Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-20T21:08:16Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1630" uid: 9e8f6aed-e4e8-4134-97cb-1f7ce631e8fd type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-20T21:08:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"046d9259-c16a-408b-ab2f-8776d208918f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T21:08:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T21:45:09Z" name: node-ca-dockercfg-7wb2n namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 046d9259-c16a-408b-ab2f-8776d208918f resourceVersion: "45339" uid: e72dc680-d6f4-4c84-87a1-65cb05cdc05c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-20T21:09:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1b80f808-caae-4be7-ae7d-1b5717dbb8f3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T21:09:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T21:45:12Z" name: pruner-dockercfg-k9flb namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 1b80f808-caae-4be7-ae7d-1b5717dbb8f3 resourceVersion: "45573" uid: 255fde96-1b48-4a40-b110-085309e4fd8e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-20T21:09:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"30127119-8797-44b0-8241-828ad7c58fcc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T21:09:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T21:45:12Z" name: registry-dockercfg-4cm2d namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 30127119-8797-44b0-8241-828ad7c58fcc resourceVersion: "45571" uid: 7db7997b-3f9e-4596-85b5-1af157540fbe type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "47531"