--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T16:16:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:16:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0b01aa93-ab5d-414b-8bd1-57711a639797"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:16:07Z" name: builder-dockercfg-pdzwk namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 0b01aa93-ab5d-414b-8bd1-57711a639797 resourceVersion: "3634" uid: 9ccd6221-0b82-4811-913f-eb449855bdd6 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-17T16:16:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:16:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"de349590-eda5-4e71-b713-45105853d311"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:16:02Z" name: cluster-image-registry-operator-dockercfg-w9scx namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: de349590-eda5-4e71-b713-45105853d311 resourceVersion: "2891" uid: 8b1c77c2-9b8c-4289-9673-afc1cf2329b7 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T16:16:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:16:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f71faabd-c1e1-4505-9b90-0ba31647e204"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:16:02Z" name: default-dockercfg-7tc76 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: f71faabd-c1e1-4505-9b90-0ba31647e204 resourceVersion: "2895" uid: 56bce5da-a028-40dc-b52f-824cd4313d8c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T16:16:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:16:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b5f00ab6-5804-4bb5-8ee8-3ac7b751e114"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:16:07Z" name: deployer-dockercfg-6wvf5 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: b5f00ab6-5804-4bb5-8ee8-3ac7b751e114 resourceVersion: "3638" uid: 80a056ca-ab07-48b2-ac1d-5f39caf6f801 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:9d3f6af8b6c9d14324066fba2240954915447e54fd724777c0372bd72dcc4640 creationTimestamp: "2026-04-17T16:15:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T16:15:44Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1990" uid: 23f4db67-f572-42ed-b40d-33b5f0214c31 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T16:21:51Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 4de1df8d-9757-484c-acc9-f3201993e6c5 service.beta.openshift.io/expiry: "2028-04-16T16:21:51Z" creationTimestamp: "2026-04-17T16:21:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"4de1df8d-9757-484c-acc9-f3201993e6c5"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T16:21:52Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 4de1df8d-9757-484c-acc9-f3201993e6c5 resourceVersion: "7645" uid: c38f8094-cbe0-4314-9bc4-e8241ca611dd type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-17T16:15:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T16:15:44Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1989" uid: ffef991b-07b4-4bc6-960d-e00abe6aa61a type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-17T16:15:40Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-17T16:15:40Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1673" uid: 95de3cf2-9d30-4409-9e4d-42db7e73a4c4 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-17T16:16:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:16:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3621f67a-c599-47f1-b781-2fd3249d7883"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:16:02Z" name: node-ca-dockercfg-jx9nj namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 3621f67a-c599-47f1-b781-2fd3249d7883 resourceVersion: "2904" uid: 68d2c06a-fad6-497d-9da1-889cf20a6e6a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-17T16:16:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:16:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f56b2523-24f8-41af-9e05-e8504cab0165"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:16:02Z" name: pruner-dockercfg-6br76 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: f56b2523-24f8-41af-9e05-e8504cab0165 resourceVersion: "2922" uid: 12730625-76fa-4e3e-a695-7ed9e5ce4151 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-17T16:16:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:16:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"871f0ce9-1494-42a3-9c10-5e9166b786c6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:16:02Z" name: registry-dockercfg-5mbwd namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 871f0ce9-1494-42a3-9c10-5e9166b786c6 resourceVersion: "2951" uid: 89fa32c1-a97a-438d-a4ba-2997ba54cf17 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "41411"