--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T18:39:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c17b8ceb-ffed-4f8f-80c2-3d5c3d19a331"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:39:05Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:15:06Z" name: builder-dockercfg-ttkx4 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: c17b8ceb-ffed-4f8f-80c2-3d5c3d19a331 resourceVersion: "41066" uid: c2e1569e-3f79-4edd-a388-9b262407ae58 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-22T18:39:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b867dd11-3f7d-40fb-8e9e-d01ab6d295d4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:39:00Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:15:01Z" name: cluster-image-registry-operator-dockercfg-fgghz namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: b867dd11-3f7d-40fb-8e9e-d01ab6d295d4 resourceVersion: "40795" uid: d69dcaec-c6c5-4bcd-a9fa-c08feed66c2a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T18:39:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b17c5457-6712-46ca-b206-f83f3084e1e9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:39:00Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:15:01Z" name: default-dockercfg-7p4r6 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: b17c5457-6712-46ca-b206-f83f3084e1e9 resourceVersion: "40807" uid: 73c42cf2-057d-460c-afd0-6c3f4e34a85f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T18:39:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"411550ac-157a-4aa0-9a9e-a093fa8c4d96"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:39:05Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:15:06Z" name: deployer-dockercfg-hkhwl namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 411550ac-157a-4aa0-9a9e-a093fa8c4d96 resourceVersion: "41055" uid: 205acb5e-2064-4c2e-8905-0530ac7342b8 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:d3772ebb82fbaa149b88c3ad51ef6de4966a69cc7ca331497361c797d6f00730 creationTimestamp: "2026-04-22T18:38:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T18:38:47Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1853" uid: 7ad3f97b-cfcd-474a-af6e-c91eb79008d0 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T18:45:03Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 03a4ef8d-594d-4a07-aa7c-f585c4d082d1 service.beta.openshift.io/expiry: "2028-04-21T18:45:03Z" creationTimestamp: "2026-04-22T18:45:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"03a4ef8d-594d-4a07-aa7c-f585c4d082d1"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T18:45:04Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 03a4ef8d-594d-4a07-aa7c-f585c4d082d1 resourceVersion: "7860" uid: a5b7269e-d363-4ebe-8c4c-e8de9700ddad type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-22T18:38:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T18:38:47Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1852" uid: c37ca20d-efe3-4b32-8139-6f943f3bd833 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-22T18:38:45Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-22T18:38:45Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1655" uid: 1e5313c7-6b65-440d-b144-3e7d287ce197 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-22T18:39:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"745ca8a1-7027-4be8-8e64-eab7af2fa7ad"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:39:00Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:15:01Z" name: node-ca-dockercfg-75794 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 745ca8a1-7027-4be8-8e64-eab7af2fa7ad resourceVersion: "40814" uid: cedc80ce-a109-4238-b0d6-4c11c7e95362 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-22T18:39:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"167a636f-b39e-41bf-bbac-21c01cc9a285"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:39:00Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:15:01Z" name: pruner-dockercfg-lrkhm namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 167a636f-b39e-41bf-bbac-21c01cc9a285 resourceVersion: "40809" uid: 1323e09a-ccb8-48d5-ac16-80cddc03f4f4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-22T18:39:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e57a8005-3fd3-4af6-aaeb-57ed4e645abe"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:39:00Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:15:01Z" name: registry-dockercfg-5lrh7 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: e57a8005-3fd3-4af6-aaeb-57ed4e645abe resourceVersion: "40804" uid: d4756f21-a660-49af-b356-88af1ea24c96 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "46659"