--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T08:29:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0a1a322a-5be8-411f-8da6-b9e10f3f40bf"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T08:29:52Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T09:05:56Z" name: builder-dockercfg-4vxfw namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 0a1a322a-5be8-411f-8da6-b9e10f3f40bf resourceVersion: "16261" uid: fa06a662-e0a0-4722-ae51-7da9b111610f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-16T08:29:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e56f8bdc-2ae9-4170-be7b-733b18e44919"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T08:29:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T09:05:53Z" name: cluster-image-registry-operator-dockercfg-9tcdz namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: e56f8bdc-2ae9-4170-be7b-733b18e44919 resourceVersion: "16155" uid: a1b8e589-ab01-48ab-96c9-c865f4d987bd type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T08:29:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3faa900c-bf3c-495c-b6bf-7ef583e9c60e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T08:29:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T09:05:52Z" name: default-dockercfg-9jxz8 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 3faa900c-bf3c-495c-b6bf-7ef583e9c60e resourceVersion: "16115" uid: 9a96bad7-649d-4b8a-b660-3fdc26ce8177 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T08:29:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a93f7546-75e5-453e-bd12-15d8b1056d4a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T08:29:52Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T09:05:56Z" name: deployer-dockercfg-fljqk namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: a93f7546-75e5-453e-bd12-15d8b1056d4a resourceVersion: "16256" uid: f3acef6c-0db0-45f4-9fa5-e2504968738d type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:bfd006abbecfceb897e89bdbd20ee0dc4012402b11f2fa581434e3c4815a7e51 creationTimestamp: "2026-04-16T08:29:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T08:29:51Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "3394" uid: 95c7a89b-be69-4554-aa58-5079d7049204 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T08:35:29Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 9edde4a8-edb6-4957-a013-d53c4599f2a7 service.beta.openshift.io/expiry: "2028-04-15T08:35:29Z" creationTimestamp: "2026-04-16T08:35:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"9edde4a8-edb6-4957-a013-d53c4599f2a7"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T08:35:30Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 9edde4a8-edb6-4957-a013-d53c4599f2a7 resourceVersion: "6526" uid: 67955ea6-3c75-4366-b321-11f513657663 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-16T08:29:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T08:29:51Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "3392" uid: 81261f4a-e2b8-49bb-aa72-82a3c4fc518b type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-16T08:29:23Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-16T08:29:23Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1670" uid: b29a8833-7e48-4493-8f83-8fbcbf3070a8 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-16T08:29:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5b9440cf-f0fe-4216-9a5a-d0f7e8c9cc60"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T08:29:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T09:05:53Z" name: node-ca-dockercfg-dffzl namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 5b9440cf-f0fe-4216-9a5a-d0f7e8c9cc60 resourceVersion: "16128" uid: 74188ff0-e3dc-4e01-8260-d608cb02bd82 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-16T08:29:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b419519d-a1dc-459b-b8c7-32ea8a10e85c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T08:29:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T09:05:55Z" name: pruner-dockercfg-xhfdl namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: b419519d-a1dc-459b-b8c7-32ea8a10e85c resourceVersion: "16234" uid: a4207fc6-bdd3-4dd3-860d-fa78e58619d9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-16T08:29:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"451cb2f1-d687-4fe2-a6db-becf8267410f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T08:29:51Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T09:05:56Z" name: registry-dockercfg-dk699 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 451cb2f1-d687-4fe2-a6db-becf8267410f resourceVersion: "16255" uid: dc707197-f971-4cc0-9e2e-dcc05c30d761 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "17912"