--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T20:00:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:00:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f7db349b-f37e-404a-9677-78e844a14cb5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:00:10Z" name: builder-dockercfg-2nj88 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: f7db349b-f37e-404a-9677-78e844a14cb5 resourceVersion: "3824" uid: 95011b6f-48eb-45c7-8b70-d333e353f106 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-17T20:00:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"657722ff-631f-4298-9efd-af358a665cc3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:00:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:00:05Z" name: cluster-image-registry-operator-dockercfg-k5dvg namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 657722ff-631f-4298-9efd-af358a665cc3 resourceVersion: "3102" uid: 677ca8c0-4ce8-4e2d-bd7f-a536eac93d34 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T20:00:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c70d0947-d9ef-4eb4-b688-f17f218d70a2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:00:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:00:05Z" name: default-dockercfg-nzvf6 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: c70d0947-d9ef-4eb4-b688-f17f218d70a2 resourceVersion: "3111" uid: 64650040-829c-4b25-bd6f-f5ee89bb4d22 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T20:00:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:00:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0289708b-3f93-4db4-91ac-32cbf47b5dd1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:00:10Z" name: deployer-dockercfg-rcds7 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 0289708b-3f93-4db4-91ac-32cbf47b5dd1 resourceVersion: "3825" uid: fed533f6-b5fa-4b91-b232-a18fa3648a72 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:35ac811a2da11d59ebc264e0e6d618ec5b9ed6adccc11a7cb88dbb0f8c06846a creationTimestamp: "2026-04-17T19:59:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T19:59:40Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1989" uid: 59874c85-6d48-4517-80b7-6d6efa448731 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T20:05:50Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: db7dd7b9-4850-4774-bebf-c678cda719d9 service.beta.openshift.io/expiry: "2028-04-16T20:05:50Z" creationTimestamp: "2026-04-17T20:05:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"db7dd7b9-4850-4774-bebf-c678cda719d9"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T20:05:50Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: db7dd7b9-4850-4774-bebf-c678cda719d9 resourceVersion: "7736" uid: 67168ba5-173a-48d7-b488-b964c83f3633 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-17T19:59:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T19:59:40Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1987" uid: 4cbb71c7-e7d0-4be9-a9fc-35776c47f043 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-17T19:59:36Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-17T19:59:36Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1632" uid: 620d3e51-806b-4f2d-8ed9-2ddbad37d618 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-17T20:00:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bf4af0cb-1cde-42d0-8c15-9a0fa8193c21"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:00:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:00:05Z" name: node-ca-dockercfg-7mfpt namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: bf4af0cb-1cde-42d0-8c15-9a0fa8193c21 resourceVersion: "3113" uid: fdd92781-d111-4100-b895-249fee764784 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-17T20:00:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"89b29a25-7a2e-4ad6-8363-1ed257484047"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:00:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:00:05Z" name: pruner-dockercfg-mq8qg namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 89b29a25-7a2e-4ad6-8363-1ed257484047 resourceVersion: "3114" uid: 7b47787e-4851-4dbd-9ae7-23f030ef9d30 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-17T20:00:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cbcc018a-f94b-49b6-9770-03b855719e1a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:00:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:00:05Z" name: registry-dockercfg-rkflr namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: cbcc018a-f94b-49b6-9770-03b855719e1a resourceVersion: "3124" uid: b1bbec7a-b206-4d95-885a-bf27087889bb type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "27411"