--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T09:08:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T09:08:05Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c40ceeab-bd2c-41ed-96f4-3323331059f2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T09:08:05Z" name: builder-dockercfg-dhtmj namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: c40ceeab-bd2c-41ed-96f4-3323331059f2 resourceVersion: "4213" uid: c8adbc19-75f8-47a1-be45-54f1a9bb4eff type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-17T09:07:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T09:07:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d1f49a77-dde5-43bd-965a-4407e05e9983"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T09:07:59Z" name: cluster-image-registry-operator-dockercfg-mspcd namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: d1f49a77-dde5-43bd-965a-4407e05e9983 resourceVersion: "3632" uid: 20426c24-05de-4ade-93e7-76098fabf7e9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T09:07:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T09:07:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2c74214b-3c99-412b-be21-ff068b83ee67"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T09:07:59Z" name: default-dockercfg-5whp8 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 2c74214b-3c99-412b-be21-ff068b83ee67 resourceVersion: "3633" uid: 6987bd33-b4ee-4317-bed7-555ef1c5303f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T09:08:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T09:08:05Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4c6a3188-f58b-4d1a-925a-801ab86ab492"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T09:08:05Z" name: deployer-dockercfg-sdrzk namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 4c6a3188-f58b-4d1a-925a-801ab86ab492 resourceVersion: "4215" uid: f0fa84cb-eb20-4c9d-a76f-658d88549cad type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:4e0e77a07d9aab041472944708cbd33dbe1fb567cb8c6261f6c95857f608d4ff creationTimestamp: "2026-04-17T09:07:11Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T09:07:11Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1906" uid: b1ed5fee-5f20-46b0-a384-517e25d8dc0a type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T09:13:31Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: e1134f75-60b1-4d53-a33a-74dccd3c818c service.beta.openshift.io/expiry: "2028-04-16T09:13:31Z" creationTimestamp: "2026-04-17T09:13:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"e1134f75-60b1-4d53-a33a-74dccd3c818c"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T09:13:32Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: e1134f75-60b1-4d53-a33a-74dccd3c818c resourceVersion: "7810" uid: 2166f036-4c9a-41dc-90b3-76dd87c6f9cb type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-17T09:07:11Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T09:07:11Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1904" uid: b07d2703-1e58-44c4-9597-4558d0d3de86 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-17T09:07:08Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-17T09:07:08Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1675" uid: 5f7662f6-7cad-42ff-b27a-ba324ef19fbd type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-17T09:07:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"862781de-b71b-4be0-a795-cabb7851d1ef"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T09:07:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T09:08:00Z" name: node-ca-dockercfg-wnmh2 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 862781de-b71b-4be0-a795-cabb7851d1ef resourceVersion: "3645" uid: 30af6bb2-8772-4f19-9880-cb8ad95190d2 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-17T09:07:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"16a724e6-4a0e-4504-a2ef-58ab256dfcd2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T09:07:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T09:08:00Z" name: pruner-dockercfg-v4fbm namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 16a724e6-4a0e-4504-a2ef-58ab256dfcd2 resourceVersion: "3646" uid: 9041a39a-f1e3-42e2-9b83-8ec2b1ea0484 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-17T09:07:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"51abbef4-46eb-4f72-a8ba-f2522dcc1b14"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T09:07:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T09:08:00Z" name: registry-dockercfg-v9xfs namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 51abbef4-46eb-4f72-a8ba-f2522dcc1b14 resourceVersion: "3649" uid: a7626bd4-e909-45bd-a0d8-1b5581e6ba66 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "13836"