--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-21T00:00:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6aa9af92-94bc-44d7-a9d5-f3d05341144c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T00:00:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T00:36:09Z" name: builder-dockercfg-6njc6 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 6aa9af92-94bc-44d7-a9d5-f3d05341144c resourceVersion: "45161" uid: c20f6e8b-a137-46d0-bb55-cedbe4a5067c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-21T00:00:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8c526619-4f04-4931-b217-84bec38b6154"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T00:00:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T00:36:03Z" name: cluster-image-registry-operator-dockercfg-c2bm7 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 8c526619-4f04-4931-b217-84bec38b6154 resourceVersion: "44920" uid: 5ed86bf4-41fe-4bb3-b23f-4e81f69ddebb type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-21T00:00:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bf78b3cb-0d02-49fb-b7c8-d7543d57b245"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T00:00:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T00:36:03Z" name: default-dockercfg-wn2gz namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: bf78b3cb-0d02-49fb-b7c8-d7543d57b245 resourceVersion: "44928" uid: ea5b827a-d22e-4867-9321-526595023bbf type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-21T00:00:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"06bb65c8-2c1c-4633-a66e-2cfb168ba22a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T00:00:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T00:36:09Z" name: deployer-dockercfg-gsq9k namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 06bb65c8-2c1c-4633-a66e-2cfb168ba22a resourceVersion: "45165" uid: 56dc3841-b4d6-4f95-b2fc-41c3cb0216a1 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:596d36793e04b6c9e5440be824cb98254c8345c9b154c9cc5a88f4ae40d18187 creationTimestamp: "2026-04-20T23:59:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-20T23:59:32Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "2015" uid: 77327473-4887-4682-8781-b71e7a048740 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T00:03:58Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 0da12f51-621d-423c-bcf8-39ed251f4525 service.beta.openshift.io/expiry: "2028-04-20T00:03:58Z" creationTimestamp: "2026-04-21T00:03:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"0da12f51-621d-423c-bcf8-39ed251f4525"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T00:03:58Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 0da12f51-621d-423c-bcf8-39ed251f4525 resourceVersion: "7330" uid: baf01967-b0d8-47b1-bcca-1881cc8de1f0 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-20T23:59:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-20T23:59:32Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "2013" uid: 03e6e510-2a1b-432a-ba1d-2cb77e34e6cd type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-20T23:59:28Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-20T23:59:28Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1651" uid: 4f97bce0-d07a-415a-8cb8-2f05151123af type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-21T00:00:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f67208e4-b27c-4b23-8467-4ed084913630"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T00:00:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T00:36:03Z" name: node-ca-dockercfg-jsxbx namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: f67208e4-b27c-4b23-8467-4ed084913630 resourceVersion: "44908" uid: c354fe86-6634-466d-8a1c-2bf41a5fc7d5 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-21T00:00:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f9035e48-a612-4ad8-9ed6-83d8ec0df396"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T00:00:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T00:36:03Z" name: pruner-dockercfg-5ggjq namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: f9035e48-a612-4ad8-9ed6-83d8ec0df396 resourceVersion: "44925" uid: 6876d637-4406-4f48-880a-15e441654aa1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-21T00:00:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a8173345-2c20-42cb-96f9-b36bcb3e08f2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T00:00:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T00:36:03Z" name: registry-dockercfg-pctqm namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: a8173345-2c20-42cb-96f9-b36bcb3e08f2 resourceVersion: "44931" uid: 85e68934-f9e5-4197-8142-5d109bb8474b type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "48130"