--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-18T02:42:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bc8f7050-ffb6-4af2-bc40-fbdd84371442"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-18T02:42:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-18T03:18:47Z" name: builder-dockercfg-nw529 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: bc8f7050-ffb6-4af2-bc40-fbdd84371442 resourceVersion: "42996" uid: cb87abda-0cf8-4afe-94ae-93ae10b19090 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-18T02:42:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9c63324e-bcaf-4f07-88cf-b39aa9eac231"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-18T02:42:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-18T03:18:42Z" name: cluster-image-registry-operator-dockercfg-vl779 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 9c63324e-bcaf-4f07-88cf-b39aa9eac231 resourceVersion: "42817" uid: 1b6d603f-ac80-4525-9a72-09acb0cc22f5 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-18T02:42:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5c5aa2ab-2cf5-4b6e-a829-c120d38291a7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-18T02:42:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-18T03:18:42Z" name: default-dockercfg-42bmn namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 5c5aa2ab-2cf5-4b6e-a829-c120d38291a7 resourceVersion: "42816" uid: d0993998-bd89-4151-8842-b82ec4327125 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-18T02:42:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8162c79e-b7f5-4b1a-8716-b235846b7b8b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-18T02:42:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-18T03:18:47Z" name: deployer-dockercfg-bqf9d namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 8162c79e-b7f5-4b1a-8716-b235846b7b8b resourceVersion: "42986" uid: 72d198e1-00a7-4218-a799-f7fde80f1d2f type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:81e507aca675689fae3f18bae74ef9f1a580db3856c18a640525825b35b51539 creationTimestamp: "2026-04-18T02:42:24Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-18T02:42:24Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "2026" uid: b36512c4-40db-44b4-8735-ec7cfdc22c19 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-17T02:48:36Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: bd8a9ebc-4353-4be5-aac7-cca6c34f1cb0 service.beta.openshift.io/expiry: "2028-04-17T02:48:36Z" creationTimestamp: "2026-04-18T02:48:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"bd8a9ebc-4353-4be5-aac7-cca6c34f1cb0"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-18T02:48:36Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: bd8a9ebc-4353-4be5-aac7-cca6c34f1cb0 resourceVersion: "7726" uid: caff7cac-72d7-497e-8a5a-d01741ad5d37 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-18T02:42:24Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-18T02:42:24Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "2025" uid: b58187a9-b942-4885-8816-c40360a39c20 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-18T02:42:21Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-18T02:42:21Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1664" uid: 50f8e7ad-b757-4a8c-ad3d-1234b62a14b2 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-18T02:42:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"47cd4784-d7e2-4774-8fd3-67a5c7c8828b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-18T02:42:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-18T03:18:42Z" name: node-ca-dockercfg-wff7q namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 47cd4784-d7e2-4774-8fd3-67a5c7c8828b resourceVersion: "42809" uid: 03471b61-095c-4af7-af1e-3a0496adb591 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-18T02:42:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8cadaadf-84fe-4280-ab59-e2aac1815be1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-18T02:42:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-18T03:18:42Z" name: pruner-dockercfg-g2smk namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 8cadaadf-84fe-4280-ab59-e2aac1815be1 resourceVersion: "42807" uid: 18affa43-735f-402a-bda6-bc64eee3ce63 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-18T02:42:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2a50918c-c2fe-4a59-bc04-81b1e58b9d90"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-18T02:42:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-18T03:18:42Z" name: registry-dockercfg-jxh9b namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 2a50918c-c2fe-4a59-bc04-81b1e58b9d90 resourceVersion: "42821" uid: b47662eb-5c30-47bc-8709-67098b61e9ed type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "46173"