--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T15:54:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d9735075-85e9-4405-b16e-c7ffdd91e8cc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:54:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:54:33Z" name: builder-dockercfg-wsr89 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: d9735075-85e9-4405-b16e-c7ffdd91e8cc resourceVersion: "4099" uid: 35d2c8b4-bf6f-4f6d-b778-390df442d62c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE4OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-22T15:54:26Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e2804bf8-a850-4ce9-a0dd-85ce404d82b1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:54:26Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:54:30Z" name: cluster-image-registry-operator-dockercfg-fwd2k namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: e2804bf8-a850-4ce9-a0dd-85ce404d82b1 resourceVersion: "3719" uid: a3ff26f2-f218-472a-85df-e29350aa4566 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T15:54:26Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2521e58e-8099-4526-9699-2158e069ce8c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:54:26Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:54:30Z" name: default-dockercfg-n75wk namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 2521e58e-8099-4526-9699-2158e069ce8c resourceVersion: "3720" uid: 261a4182-7784-4633-b505-686c3f0a4a50 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T15:54:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7f9a5907-6097-47e8-9871-89f84d9df8f9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:54:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:54:33Z" name: deployer-dockercfg-jfmkx namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 7f9a5907-6097-47e8-9871-89f84d9df8f9 resourceVersion: "4103" uid: 74d6d4d1-62a1-4ed0-bc94-a430a58f6b71 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:90a865eb0585754cb69236f297ad162ec31dfa1ce906ac605e6ac933f0daa818 creationTimestamp: "2026-04-22T15:54:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T15:54:28Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "3446" uid: 98fd4c29-02e6-499a-ad21-46d9439fefa2 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T16:00:09Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 0c9c2d75-db93-4391-8908-ac08d9ae7272 service.beta.openshift.io/expiry: "2028-04-21T16:00:09Z" creationTimestamp: "2026-04-22T16:00:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"0c9c2d75-db93-4391-8908-ac08d9ae7272"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T16:00:10Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 0c9c2d75-db93-4391-8908-ac08d9ae7272 resourceVersion: "7555" uid: 07a30c64-4e16-47c3-9e31-ed3d5921f11d type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-22T15:54:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T15:54:28Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "3444" uid: f5a44fcf-e684-4bfe-ab24-6ed2fdbb3da2 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-22T15:53:56Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-22T15:53:56Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1638" uid: 6f1e08fb-3216-4a1c-8dbe-b3b6516aa550 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-22T15:54:26Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"957ab2f3-fe29-402f-8ac1-0a8d42332f45"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:54:26Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:54:30Z" name: node-ca-dockercfg-pmvxt namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 957ab2f3-fe29-402f-8ac1-0a8d42332f45 resourceVersion: "3732" uid: 40d37e9f-fc8d-49b7-aceb-412b10c6fdc0 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-22T15:54:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cbb1c26f-3078-4fd7-ba87-2d27a3256739"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:54:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:54:33Z" name: pruner-dockercfg-rmtpz namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: cbb1c26f-3078-4fd7-ba87-2d27a3256739 resourceVersion: "4046" uid: 380a94a0-d153-4ae9-9bd8-6255af2f12a1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-22T15:54:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2b1c2e51-82dc-4293-b33e-04b58d91ce65"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:54:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:54:33Z" name: registry-dockercfg-4mqmh namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 2b1c2e51-82dc-4293-b33e-04b58d91ce65 resourceVersion: "4073" uid: ab057de5-ed82-4334-bc06-a4ee215d2c57 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "27050"