--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T13:19:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0dc4a474-131c-4bb6-bf29-cbc88f655097"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T13:19:53Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T13:55:53Z" name: builder-dockercfg-gxz8s namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 0dc4a474-131c-4bb6-bf29-cbc88f655097 resourceVersion: "22159" uid: 0b2f74d0-b23e-4faa-bdf5-47f2b2bef03b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE4OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-22T13:19:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c10941b0-998e-44c6-8cc3-7201ab59b017"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T13:19:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T13:55:49Z" name: cluster-image-registry-operator-dockercfg-rhhpn namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: c10941b0-998e-44c6-8cc3-7201ab59b017 resourceVersion: "22041" uid: 49da17f7-acd8-47ae-858d-83d0a08ff5e4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T13:19:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cb866f25-41c8-47ba-8e09-4a2ab3820595"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T13:19:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T13:55:49Z" name: default-dockercfg-6sclh namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: cb866f25-41c8-47ba-8e09-4a2ab3820595 resourceVersion: "22038" uid: 341ba6c4-9762-4d95-8696-d31a1e74973e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T13:19:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"73e57b43-2f5e-42c2-877e-e036bcaa42b0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T13:19:53Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T13:55:53Z" name: deployer-dockercfg-nv2ph namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 73e57b43-2f5e-42c2-877e-e036bcaa42b0 resourceVersion: "22147" uid: bf3b3589-f58b-4e95-8a0c-9f482d5770b2 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:34a158ed414d8eea76e74350afc1067d1dcf0c358f71c887684faca45e0fbe90 creationTimestamp: "2026-04-22T13:19:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T13:19:14Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1642" uid: 6613de93-36c5-4f42-8d0e-1716c52c00a1 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T13:21:49Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 4b433168-4c85-4270-8717-fc95f5b005f8 service.beta.openshift.io/expiry: "2028-04-21T13:21:49Z" creationTimestamp: "2026-04-22T13:21:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"4b433168-4c85-4270-8717-fc95f5b005f8"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T13:21:50Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 4b433168-4c85-4270-8717-fc95f5b005f8 resourceVersion: "6578" uid: 64e00d03-907a-48b1-86bd-8601009a96b6 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-22T13:19:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T13:19:14Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1641" uid: b73c4fbd-cdc6-4fef-b37e-58eb35bafe3f type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-22T13:19:10Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-22T13:19:10Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1485" uid: 9515790c-6812-4611-bf90-ea9b4477d54d type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-22T13:19:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"617b42f9-fdd4-49ee-8da2-629c46f036cd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T13:19:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T13:55:49Z" name: node-ca-dockercfg-64hkt namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 617b42f9-fdd4-49ee-8da2-629c46f036cd resourceVersion: "22036" uid: 3a5b79f2-e620-408e-bf65-42085527d0cc type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-22T13:19:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"440b225b-c979-4f93-b943-9a96d283a0c9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T13:19:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T13:55:49Z" name: pruner-dockercfg-mpfdn namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 440b225b-c979-4f93-b943-9a96d283a0c9 resourceVersion: "22021" uid: 9d4ac68c-ea73-4a14-a3fa-597645c61cbd type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-22T13:19:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ee02df88-1df6-43da-937a-42d0fd6423fb"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T13:19:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T13:55:49Z" name: registry-dockercfg-7w6d8 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: ee02df88-1df6-43da-937a-42d0fd6423fb resourceVersion: "22033" uid: 6e6954c8-3b44-4e5d-9fff-4ae40de6174d type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "27131"