--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-21T14:22:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9c3f8dc4-71f0-473d-ba7d-edcd40d87fdd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:22:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T14:58:07Z" name: builder-dockercfg-km8bv namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 9c3f8dc4-71f0-473d-ba7d-edcd40d87fdd resourceVersion: "39434" uid: 3b700825-495f-44f3-a1b5-523a5489e9d3 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-21T14:22:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2b0332d9-f717-45d6-99cd-de91b6302758"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:22:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T14:58:02Z" name: cluster-image-registry-operator-dockercfg-5rcrd namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 2b0332d9-f717-45d6-99cd-de91b6302758 resourceVersion: "39259" uid: 42bfae71-235b-4a7a-b6b9-ba03d6486833 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-21T14:22:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e4b5d9f4-7109-45ab-9f32-6b895b381f8c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:22:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T14:58:02Z" name: default-dockercfg-rwwq2 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: e4b5d9f4-7109-45ab-9f32-6b895b381f8c resourceVersion: "39255" uid: ee9d8749-5045-434a-ac1e-4ff9017738d7 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-21T14:22:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"66d7a631-7e01-4465-a3ab-55ba78520882"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:22:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T14:58:07Z" name: deployer-dockercfg-mvdtm namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 66d7a631-7e01-4465-a3ab-55ba78520882 resourceVersion: "39450" uid: 3cdabe36-317e-4138-b16b-3807b0a3b307 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:5fb403445957df8d0fbd588025f6824f38ab374b1bf2c4659741c9fcca4fbfd5 creationTimestamp: "2026-04-21T14:21:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-21T14:21:43Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1969" uid: 67ba277f-e7f4-4cf7-830f-779ffcf61087 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T14:27:59Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: bbd83233-c237-4ec0-a759-3fa35115f2ab service.beta.openshift.io/expiry: "2028-04-20T14:27:59Z" creationTimestamp: "2026-04-21T14:28:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"bbd83233-c237-4ec0-a759-3fa35115f2ab"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T14:28:00Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: bbd83233-c237-4ec0-a759-3fa35115f2ab resourceVersion: "7738" uid: aee4ded9-84fa-459e-b150-c92e4c87a99e type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-21T14:21:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-21T14:21:43Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1967" uid: b8675d8d-639a-4ec3-a738-d168166f318f type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-21T14:21:39Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-21T14:21:39Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1710" uid: 1da20516-4520-4527-a06b-70122f38b302 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-21T14:22:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6d4491c3-d4d5-4740-afec-eaaf7c08ff7d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:22:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T14:58:02Z" name: node-ca-dockercfg-t6cq2 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 6d4491c3-d4d5-4740-afec-eaaf7c08ff7d resourceVersion: "39271" uid: 3c8b7581-6d7c-4774-b473-29dfb7985fa9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-21T14:22:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0d174f1c-4161-4ad6-b7bd-3f392313cfd2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:22:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T14:58:02Z" name: pruner-dockercfg-9lm4j namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 0d174f1c-4161-4ad6-b7bd-3f392313cfd2 resourceVersion: "39253" uid: 274de248-dbd4-4626-9556-28764c8da46b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-21T14:22:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b1e38baa-ac18-4382-950c-9c163a3fdc9a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:22:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T14:58:02Z" name: registry-dockercfg-4v5jp namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: b1e38baa-ac18-4382-950c-9c163a3fdc9a resourceVersion: "39249" uid: e9436ac0-89a6-4676-b0bd-bf272bb10def type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "50989"