--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T16:18:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6e835fe1-9783-458f-9c75-b1194e100439"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T16:18:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T16:54:02Z" name: builder-dockercfg-99jhq namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 6e835fe1-9783-458f-9c75-b1194e100439 resourceVersion: "27828" uid: fda2a203-51da-4943-806e-84f611a40503 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-22T16:17:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"820892d4-4758-4d7f-8d87-148aa57ba2cb"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T16:17:57Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T16:53:58Z" name: cluster-image-registry-operator-dockercfg-r78sj namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 820892d4-4758-4d7f-8d87-148aa57ba2cb resourceVersion: "27701" uid: 7395cb03-61b4-4b83-ba8a-ce9637c134f3 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T16:17:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c0b9378e-d82a-43bc-b218-e6ef2a11d63d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T16:17:57Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T16:53:58Z" name: default-dockercfg-k5vjw namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: c0b9378e-d82a-43bc-b218-e6ef2a11d63d resourceVersion: "27702" uid: 9fc24aa8-6469-4fcd-8271-3ef134e0ff78 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T16:18:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c5f080a2-76a6-4382-9dcf-5146c0918ef2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T16:18:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T16:54:02Z" name: deployer-dockercfg-8t56q namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: c5f080a2-76a6-4382-9dcf-5146c0918ef2 resourceVersion: "27826" uid: 4be6b81e-8a69-49ab-ac90-768cc2061838 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:d984443dd5d1573c1097a21858ba885a48dcaaecd1352b8d775bda7c0b58870f creationTimestamp: "2026-04-22T16:17:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T16:17:49Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "2142" uid: bb111ecd-1ec3-48dd-ad2d-ff940ce44ea9 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T16:24:02Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: bbc3aa33-2294-4daf-8170-e376e117e8be service.beta.openshift.io/expiry: "2028-04-21T16:24:02Z" creationTimestamp: "2026-04-22T16:24:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"bbc3aa33-2294-4daf-8170-e376e117e8be"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T16:24:03Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: bbc3aa33-2294-4daf-8170-e376e117e8be resourceVersion: "7770" uid: bef35627-df55-4bf8-b606-8f8e8576c629 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-22T16:17:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T16:17:49Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "2141" uid: 0fb3c64d-155f-4831-a722-0e467b7cb7dd type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-22T16:17:43Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-22T16:17:43Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1644" uid: da8d80f8-de15-4a48-b579-dcb6d0bed36b type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-22T16:17:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"45e861ee-dcb9-44cc-9fed-981e2f8913b3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T16:17:57Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T16:53:58Z" name: node-ca-dockercfg-d5dct namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 45e861ee-dcb9-44cc-9fed-981e2f8913b3 resourceVersion: "27688" uid: f4279793-d59e-4ae6-96a5-3cfc945e1cf1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-22T16:17:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"008b4379-9493-4856-8bcd-9c0a65ec15b0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T16:17:58Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T16:53:58Z" name: pruner-dockercfg-gc4ww namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 008b4379-9493-4856-8bcd-9c0a65ec15b0 resourceVersion: "27713" uid: 0db27b08-6d4e-4602-9c7c-cbf1f13e907a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-22T16:17:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0a873651-6fd5-46b3-b9a7-4abd1c022c69"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T16:17:58Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T16:53:58Z" name: registry-dockercfg-r8rzs namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 0a873651-6fd5-46b3-b9a7-4abd1c022c69 resourceVersion: "27712" uid: 7cb2fb84-503b-4bb7-a71e-07520a2002e2 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "47895"