--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T07:59:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T07:59:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5aa8dd2f-5d4a-468d-8d60-701b972c19d8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:59:15Z" name: builder-dockercfg-rh87f namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 5aa8dd2f-5d4a-468d-8d60-701b972c19d8 resourceVersion: "4114" uid: fca85dc7-4bfc-419b-b6ca-df1798e4328d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-17T07:59:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"003329e8-a42d-4954-a49d-156b8c32a8a2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:59:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T07:59:10Z" name: cluster-image-registry-operator-dockercfg-kjwcq namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 003329e8-a42d-4954-a49d-156b8c32a8a2 resourceVersion: "3493" uid: 6bbfbeeb-e8bc-4b9a-b19c-e8968686a086 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T07:59:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"14c2677a-0e82-4fca-a3e1-1af19871b4fb"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:59:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T07:59:10Z" name: default-dockercfg-btpqf namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 14c2677a-0e82-4fca-a3e1-1af19871b4fb resourceVersion: "3494" uid: d873a377-26cd-438c-acb8-7bacb1d5b26b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T07:59:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T07:59:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c7415d0a-bb2d-4c88-834c-4d6840bb5617"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:59:15Z" name: deployer-dockercfg-rhkfq namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: c7415d0a-bb2d-4c88-834c-4d6840bb5617 resourceVersion: "4115" uid: a50b7093-2a5d-4285-ac4f-03a68dbfff08 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:03f3683296b36bcbd4a6fda629946e7f1261e52a5b73ec955eff609aad6c4ac2 creationTimestamp: "2026-04-17T07:58:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T07:58:58Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "2684" uid: fc017ed7-9406-4c5d-b9a0-bb58695a2cba type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T08:04:44Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 44382375-4d1a-4de3-b0fb-de42f5a45936 service.beta.openshift.io/expiry: "2028-04-16T08:04:44Z" creationTimestamp: "2026-04-17T08:04:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"44382375-4d1a-4de3-b0fb-de42f5a45936"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T08:04:45Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 44382375-4d1a-4de3-b0fb-de42f5a45936 resourceVersion: "7679" uid: 772bbe1a-1ede-4afe-99fd-b623325d7b87 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-17T07:58:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T07:58:58Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "2682" uid: 026a673b-360a-4509-9d3e-55c2e174c158 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-17T07:58:30Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-17T07:58:30Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1680" uid: f42a6bec-9238-495a-a5dd-2861f4b517ad type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-17T07:59:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0fcff58d-d19b-4596-b0f6-1d888df3d488"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:59:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T07:59:10Z" name: node-ca-dockercfg-xm7h6 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 0fcff58d-d19b-4596-b0f6-1d888df3d488 resourceVersion: "3495" uid: 0b4325c2-dd26-48ab-aba3-856474bb7409 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-17T07:59:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"be6ac3cf-a244-403a-8ae1-1607c9dac031"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:59:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T07:59:10Z" name: pruner-dockercfg-pn9zj namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: be6ac3cf-a244-403a-8ae1-1607c9dac031 resourceVersion: "3498" uid: 127c6a02-c501-4998-a32b-4c9bf2dad4e8 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-17T07:59:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0a827ccb-ce6b-458f-a59b-9d5d74a964f5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:59:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T07:59:10Z" name: registry-dockercfg-5m5pl namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 0a827ccb-ce6b-458f-a59b-9d5d74a964f5 resourceVersion: "3518" uid: 36b6133b-a2e9-414c-8911-234f4d364b1f type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "13381"