--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T14:31:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6637b99c-522d-4c6b-99cf-37c1fdb1e15a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:31:05Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:31:06Z" name: builder-dockercfg-hlhg2 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 6637b99c-522d-4c6b-99cf-37c1fdb1e15a resourceVersion: "4073" uid: 6f29ae55-089c-4457-8373-87fd962539b0 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE4OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-17T14:31:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:31:00Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fa1bf3ba-16b8-457c-b234-c24af1addf52"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:31:00Z" name: cluster-image-registry-operator-dockercfg-6r6nr namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: fa1bf3ba-16b8-457c-b234-c24af1addf52 resourceVersion: "3493" uid: 9bd93e8d-3195-41d3-93b3-d3b5811f940f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T14:31:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:31:00Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4b79d38a-6494-4589-8be3-0c473ac4718d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:31:00Z" name: default-dockercfg-qq8rz namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 4b79d38a-6494-4589-8be3-0c473ac4718d resourceVersion: "3504" uid: 9ede5d49-8251-42dc-9cd2-8a97fca1f810 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T14:31:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c2661e33-9acc-412d-89c2-b94b635e8ab9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:31:05Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:31:06Z" name: deployer-dockercfg-g7hrz namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: c2661e33-9acc-412d-89c2-b94b635e8ab9 resourceVersion: "4074" uid: 40dc080c-1f64-40dc-a80d-1e48d47938e2 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:5ccd1b4c67e7fbd550820c56260bae2a19e60c357112a81d14a963a31fc6fee9 creationTimestamp: "2026-04-17T14:30:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T14:30:27Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1850" uid: c7385ee8-480c-4107-bdd8-c805d85d35d2 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T14:36:29Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 2ed8b5e0-c176-40a4-b79b-b88068a4e6c4 service.beta.openshift.io/expiry: "2028-04-16T14:36:29Z" creationTimestamp: "2026-04-17T14:36:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"2ed8b5e0-c176-40a4-b79b-b88068a4e6c4"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T14:36:30Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 2ed8b5e0-c176-40a4-b79b-b88068a4e6c4 resourceVersion: "7687" uid: bfd88e06-4f70-4e26-8e7a-dfeb6fc033b0 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-17T14:30:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T14:30:27Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1849" uid: 9c42700c-2ccb-4bfb-8d97-de51a8919102 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-17T14:30:24Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-17T14:30:24Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1634" uid: 67f9f37b-f350-4d35-94d3-6666c4dddd8a type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-17T14:31:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:31:00Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0fccfbfa-9b21-4c7d-9c4d-b7b7e90a1b39"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:31:00Z" name: node-ca-dockercfg-njt8v namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 0fccfbfa-9b21-4c7d-9c4d-b7b7e90a1b39 resourceVersion: "3507" uid: 6908341a-f7ff-4eb3-937e-6f5b71b9f397 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-17T14:31:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:31:00Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b99e54e6-b2d9-4980-ac98-2543a0825889"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:31:00Z" name: pruner-dockercfg-lhhv2 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: b99e54e6-b2d9-4980-ac98-2543a0825889 resourceVersion: "3510" uid: 3fb508de-490a-4766-af2c-970ff325bb11 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-17T14:31:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:31:00Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4f996d21-577a-46b2-bcad-df31d71cfad0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:31:00Z" name: registry-dockercfg-qzqq8 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 4f996d21-577a-46b2-bcad-df31d71cfad0 resourceVersion: "3512" uid: 08b36144-62d3-4f69-8218-d32c31b184bb type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "27639"