--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T19:04:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cb5fecd3-3f29-46d4-af29-0aff199f46cc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T19:04:41Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T19:40:42Z" name: builder-dockercfg-fdxb5 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: cb5fecd3-3f29-46d4-af29-0aff199f46cc resourceVersion: "43332" uid: 42ac62db-4d6c-46ec-8e71-565b6e566476 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-20T19:04:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b3db4550-f725-422e-a275-322300b1bd1c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T19:04:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T19:40:36Z" name: cluster-image-registry-operator-dockercfg-8xrdw namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: b3db4550-f725-422e-a275-322300b1bd1c resourceVersion: "43035" uid: bbeda1f3-bc5e-455d-8811-f38edb17a121 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T19:04:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"39d8b3f5-a8b2-43bf-bd99-1790697fd714"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T19:04:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T19:40:37Z" name: default-dockercfg-zdqkz namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 39d8b3f5-a8b2-43bf-bd99-1790697fd714 resourceVersion: "43077" uid: 12b02635-4e0e-48a1-b5b1-ca1f38fcd98c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T19:04:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9ad3035f-a0c1-467c-9666-e9c78e77aa75"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T19:04:41Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T19:40:42Z" name: deployer-dockercfg-bnj6p namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 9ad3035f-a0c1-467c-9666-e9c78e77aa75 resourceVersion: "43308" uid: 7b24d30b-27bd-423f-b16c-76cbf8def888 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:377a8232640c22ddec25665dcc9b90aeb559459320669a0535fe55361b231342 creationTimestamp: "2026-04-20T19:04:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-20T19:04:18Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1993" uid: eceb96c7-095a-4e67-a003-d8a551b7b733 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T19:10:32Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 728c196b-1312-42f5-86d6-fb6bef3f446c service.beta.openshift.io/expiry: "2028-04-19T19:10:32Z" creationTimestamp: "2026-04-20T19:10:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"728c196b-1312-42f5-86d6-fb6bef3f446c"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T19:10:32Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 728c196b-1312-42f5-86d6-fb6bef3f446c resourceVersion: "7768" uid: 30eb6c85-ce13-4404-9e68-fc965ae4e459 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-20T19:04:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-20T19:04:18Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1992" uid: d9156daf-937a-4f54-8deb-739296a05cb3 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-20T19:04:13Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-20T19:04:13Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1653" uid: c0b4aa6b-8ec0-4297-9903-6d994cf4af8b type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-20T19:04:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"23d9f189-f35f-4316-9435-6f511fcdd2b8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T19:04:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T19:40:37Z" name: node-ca-dockercfg-4thbx namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 23d9f189-f35f-4316-9435-6f511fcdd2b8 resourceVersion: "43083" uid: ab8f69d2-7283-4d02-8bf3-3ac714dce73c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-20T19:04:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ece6ae0c-3c67-40ee-8945-6be7c7bd4877"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T19:04:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T19:40:37Z" name: pruner-dockercfg-tfbfd namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: ece6ae0c-3c67-40ee-8945-6be7c7bd4877 resourceVersion: "43073" uid: 5f47aa23-d43f-4634-b3c9-40a190820a89 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-20T19:04:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b93bc6ea-7239-48ee-bf7f-f95b83ccf6df"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T19:04:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T19:40:37Z" name: registry-dockercfg-w68rf namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: b93bc6ea-7239-48ee-bf7f-f95b83ccf6df resourceVersion: "43085" uid: ac33b076-7fab-4200-9301-648945051eeb type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "47321"