--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T17:44:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6064cf22-09a2-44d2-8fab-cb5d1640abef"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T17:44:51Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T17:44:52Z" name: builder-dockercfg-thtdz namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 6064cf22-09a2-44d2-8fab-cb5d1640abef resourceVersion: "3856" uid: 8cf0f35b-c3a0-4ead-827c-28fd027b4ba3 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-20T17:44:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3585fcbf-81a8-4b1d-9ba9-50c4359ddff3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T17:44:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T17:44:47Z" name: cluster-image-registry-operator-dockercfg-7qfjk namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 3585fcbf-81a8-4b1d-9ba9-50c4359ddff3 resourceVersion: "3259" uid: 42370e7b-f864-418e-94da-ed70792b25e1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T17:44:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0d6e327c-0289-4115-aa16-76cc597ba975"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T17:44:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T17:44:47Z" name: default-dockercfg-l8w8p namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 0d6e327c-0289-4115-aa16-76cc597ba975 resourceVersion: "3260" uid: 72c9f477-b44e-474d-9b41-db937f1d475c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T17:44:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"641c0076-8b9e-49e7-be47-7749c306c721"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T17:44:51Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T17:44:52Z" name: deployer-dockercfg-6cz7l namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 641c0076-8b9e-49e7-be47-7749c306c721 resourceVersion: "3863" uid: bfc1daa3-fa7a-4699-a059-51d5d51d09f5 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:f062466a4c82ecdd19c3500c17a037c1c36ba455b1bd72a4989f7d2bc281c82c creationTimestamp: "2026-04-20T17:44:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-20T17:44:28Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1876" uid: 5c7ecd7c-46c7-41d8-baeb-acef3a9f30cc type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T17:50:52Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 74d9d50c-adc0-45a8-a553-160c169a80e0 service.beta.openshift.io/expiry: "2028-04-19T17:50:52Z" creationTimestamp: "2026-04-20T17:50:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"74d9d50c-adc0-45a8-a553-160c169a80e0"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T17:50:53Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 74d9d50c-adc0-45a8-a553-160c169a80e0 resourceVersion: "7904" uid: 2747b257-ea1d-44f2-baaf-3c1eee894dfd type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-20T17:44:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-20T17:44:28Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1874" uid: 0ecde967-5c4f-4729-82a3-299d4e7898ac type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-20T17:44:25Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-20T17:44:25Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1690" uid: 6467e19f-0683-4b16-bc88-5f966665a7eb type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-20T17:44:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4aeb3bdf-07f7-4ab2-a326-fdaded143fd9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T17:44:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T17:44:47Z" name: node-ca-dockercfg-r8fd2 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 4aeb3bdf-07f7-4ab2-a326-fdaded143fd9 resourceVersion: "3261" uid: 73700573-70c5-401c-b6ca-ddd42a52fbaf type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-20T17:44:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"609fdf76-4081-455b-8e56-23e6818faec2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T17:44:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T17:44:47Z" name: pruner-dockercfg-gdzmc namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 609fdf76-4081-455b-8e56-23e6818faec2 resourceVersion: "3266" uid: da3f23b0-7189-43cf-a5ff-44d1b0674775 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-20T17:44:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b9012fb9-1a7e-4926-9e94-a8527b203cf1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T17:44:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T17:44:47Z" name: registry-dockercfg-gt955 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: b9012fb9-1a7e-4926-9e94-a8527b203cf1 resourceVersion: "3278" uid: 9669fcec-ad32-4630-8684-db51509169c0 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "27167"