--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T18:06:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ed88abb1-ca93-44a0-b2c8-5932d76225e6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T18:06:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T18:06:55Z" name: builder-dockercfg-hrkpz namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: ed88abb1-ca93-44a0-b2c8-5932d76225e6 resourceVersion: "4142" uid: 1d3de4c8-9f34-4f54-bc01-54c8873de4c8 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-17T18:06:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"02635fc8-169f-4e29-987e-6d64fe548949"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T18:06:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T18:06:52Z" name: cluster-image-registry-operator-dockercfg-pxcd9 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 02635fc8-169f-4e29-987e-6d64fe548949 resourceVersion: "3576" uid: 5047b577-ee94-4894-af63-6dc2fea3c16a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T18:06:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"84dfbdd8-0a26-4976-b888-f298e565a6dd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T18:06:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T18:06:52Z" name: default-dockercfg-l7qpk namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 84dfbdd8-0a26-4976-b888-f298e565a6dd resourceVersion: "3575" uid: df558d6b-8a6c-4d0b-a5e1-6f10a44a0656 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T18:06:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f4a32e9a-f081-4df0-b4dd-28e20a7fb912"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T18:06:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T18:06:55Z" name: deployer-dockercfg-dwlpc namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: f4a32e9a-f081-4df0-b4dd-28e20a7fb912 resourceVersion: "4139" uid: af035bc2-c0d3-4dd6-8355-9d8a6e12328a type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:38045104514b9e4311f2cb35faab560b33464a3cb886f2d978cc3b7f095369ab creationTimestamp: "2026-04-17T18:06:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T18:06:52Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "3448" uid: 6fa0a21c-2203-461b-9a2d-06fe7d9eae5f type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T18:12:33Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 1ab60d5f-d70b-47db-9162-e1e5e1ef24c3 service.beta.openshift.io/expiry: "2028-04-16T18:12:33Z" creationTimestamp: "2026-04-17T18:12:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"1ab60d5f-d70b-47db-9162-e1e5e1ef24c3"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T18:12:34Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 1ab60d5f-d70b-47db-9162-e1e5e1ef24c3 resourceVersion: "7737" uid: 012dbc78-e921-468c-a0ee-d3f11d8ac84c type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-17T18:06:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T18:06:52Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "3446" uid: 360b9af2-de97-43e9-8e27-86a40a31e580 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-17T18:06:24Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-17T18:06:24Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1715" uid: 965bf633-a712-454a-8122-9b203d71bf15 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-17T18:06:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d8f955fb-3f2b-40a7-bc22-809472cef8d8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T18:06:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T18:06:52Z" name: node-ca-dockercfg-qd9lw namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: d8f955fb-3f2b-40a7-bc22-809472cef8d8 resourceVersion: "3579" uid: 3a8444c5-56ad-450a-b1f9-9f78a72097fd type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-17T18:06:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"64333333-6bf8-4a41-8d20-383edb9b498f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T18:06:51Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T18:06:55Z" name: pruner-dockercfg-h5wns namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 64333333-6bf8-4a41-8d20-383edb9b498f resourceVersion: "4156" uid: 60ad856d-5b13-4071-97ca-386266d3589a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-17T18:06:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"40562d04-9887-4765-b1e5-962091216373"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T18:06:52Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T18:06:56Z" name: registry-dockercfg-wbd55 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 40562d04-9887-4765-b1e5-962091216373 resourceVersion: "4194" uid: 9a740b44-3e25-4995-934e-56e1c2aa0171 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "14353"