--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T20:11:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:11:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c48b31aa-3355-4280-a3c9-0a8d2180436c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:11:49Z" name: builder-dockercfg-g4gwm namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: c48b31aa-3355-4280-a3c9-0a8d2180436c resourceVersion: "4120" uid: b38a6f3d-d544-487b-a011-de400f074618 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-17T20:11:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a9f6c52a-a916-40b7-81ed-92d06fbaa917"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:11:43Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:11:44Z" name: cluster-image-registry-operator-dockercfg-ndnjm namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: a9f6c52a-a916-40b7-81ed-92d06fbaa917 resourceVersion: "3527" uid: 7b03800b-7f91-4ea0-aa02-6411a3712905 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T20:11:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"58116a48-92c9-43e5-abf1-ba3b8e36d41a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:11:43Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:11:44Z" name: default-dockercfg-4bz78 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 58116a48-92c9-43e5-abf1-ba3b8e36d41a resourceVersion: "3540" uid: 0c669b3e-05d0-4788-9812-eceaf26ba6bb type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T20:11:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:11:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"832f6485-819e-4d86-ae16-4090008c1ff4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:11:49Z" name: deployer-dockercfg-s5mm7 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 832f6485-819e-4d86-ae16-4090008c1ff4 resourceVersion: "4119" uid: 76f90181-522c-4cbe-9a9d-07ef7a6ee436 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:4c2e46638af415952faaf4644bbed008aaf859abc71a67e89502f19f845b40d5 creationTimestamp: "2026-04-17T20:11:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T20:11:10Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1959" uid: 2dc76095-0ce1-4277-a22e-9b37f65adb3a type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T20:17:16Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: c96068fb-1217-4b65-ad40-7ecd23c82ea9 service.beta.openshift.io/expiry: "2028-04-16T20:17:16Z" creationTimestamp: "2026-04-17T20:17:17Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"c96068fb-1217-4b65-ad40-7ecd23c82ea9"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T20:17:17Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: c96068fb-1217-4b65-ad40-7ecd23c82ea9 resourceVersion: "7665" uid: 7577236e-410d-4c70-af4a-2c7b9d2cd208 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-17T20:11:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T20:11:10Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1958" uid: c971f8ce-9dbf-490c-bdf0-8be84f9ed6fd type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-17T20:11:07Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-17T20:11:07Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1634" uid: 1dc36f16-1560-4bb7-a47c-93a0667d34a3 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-17T20:11:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"dccbc811-4eec-43db-b3f6-dd535526763a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:11:43Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:11:44Z" name: node-ca-dockercfg-ct92n namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: dccbc811-4eec-43db-b3f6-dd535526763a resourceVersion: "3543" uid: 335cabde-23f6-472c-8ef7-4fdf35bdddb3 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-17T20:11:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"377c7092-2dfd-4ef1-99a4-a6c6dd58cddf"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:11:43Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:11:44Z" name: pruner-dockercfg-4qdp5 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 377c7092-2dfd-4ef1-99a4-a6c6dd58cddf resourceVersion: "3545" uid: 48eb0238-de6b-4d91-9207-fb79f274462e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-17T20:11:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ebaa943e-0a9c-4682-a6b6-e49a76a9a6de"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:11:43Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:11:44Z" name: registry-dockercfg-tkw2s namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: ebaa943e-0a9c-4682-a6b6-e49a76a9a6de resourceVersion: "3546" uid: d829fb89-3cb4-4db2-9946-3b692c412b00 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "26942"