--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T15:13:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"398afc02-bffc-40c4-9afa-9b3d9599ef9a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T15:13:33Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T15:13:55Z" name: builder-dockercfg-7tssl namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 398afc02-bffc-40c4-9afa-9b3d9599ef9a resourceVersion: "3933" uid: 5d18465a-25ad-493c-82d9-a47f6c913adb type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-17T15:13:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a29a2016-6898-4f39-b3bc-1837657bb4c9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T15:13:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T15:13:53Z" name: cluster-image-registry-operator-dockercfg-dzf44 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: a29a2016-6898-4f39-b3bc-1837657bb4c9 resourceVersion: "3791" uid: c53647ec-5958-4da9-beaf-7147b5bc9ccd type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T15:13:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"73d56b5d-b00a-4510-9b5a-a1fd8f2f09dc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T15:13:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T15:13:53Z" name: default-dockercfg-hwwc5 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 73d56b5d-b00a-4510-9b5a-a1fd8f2f09dc resourceVersion: "3794" uid: dac9b3d4-798f-4ee1-b67c-4726415664e5 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T15:13:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0c22817b-cd81-4cd3-8024-eac71cb04d0a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T15:13:33Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T15:13:55Z" name: deployer-dockercfg-tmsxb namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 0c22817b-cd81-4cd3-8024-eac71cb04d0a resourceVersion: "3934" uid: 0dbd1238-8772-451b-adfd-8dc6a13b1002 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:28bf40128381d52e0e006936ef59cd132b6b67320d4fea34c34613b5ef0a1a8a creationTimestamp: "2026-04-17T15:13:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T15:13:53Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "3686" uid: 674d1612-dbf0-4433-8fb8-9e835c4c6dd3 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T15:19:31Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: b0ee566a-dd03-453a-bc58-c2d9b798b346 service.beta.openshift.io/expiry: "2028-04-16T15:19:31Z" creationTimestamp: "2026-04-17T15:19:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"b0ee566a-dd03-453a-bc58-c2d9b798b346"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T15:19:32Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: b0ee566a-dd03-453a-bc58-c2d9b798b346 resourceVersion: "7723" uid: 89bf3821-2479-4a89-8d24-c85a0731f50b type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-17T15:13:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T15:13:53Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "3684" uid: 3dc2c122-2ce0-46ff-90e0-334448ed0185 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-17T15:13:12Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-17T15:13:12Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1637" uid: 434af916-865d-4ab6-8e5c-b5a493f2dfb2 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-17T15:13:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a2b5f6bd-4190-4428-952b-90e798bbf08f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T15:13:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T15:13:53Z" name: node-ca-dockercfg-f72dc namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: a2b5f6bd-4190-4428-952b-90e798bbf08f resourceVersion: "3797" uid: 208aac6f-0c62-40b6-a188-4e4b1a8064fa type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-17T15:13:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7432c3d2-1cee-4362-896d-2b82b17abfa9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T15:13:52Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T15:13:57Z" name: pruner-dockercfg-nbh4j namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 7432c3d2-1cee-4362-896d-2b82b17abfa9 resourceVersion: "4002" uid: 7779cd80-f119-49cf-9e91-8b5edbd406ab type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-17T15:13:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"05144d3b-26c5-4ec4-a021-51313b342716"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T15:13:53Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T15:13:57Z" name: registry-dockercfg-5jck6 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 05144d3b-26c5-4ec4-a021-51313b342716 resourceVersion: "4005" uid: 3ed33cbe-24c5-4e70-ad8e-1f7d5e421f9c type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "28006"