--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-23T08:11:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cc491f82-4e9c-49ce-943a-a50cdb576b2e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T08:11:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T08:47:03Z" name: builder-dockercfg-r7qnh namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: cc491f82-4e9c-49ce-943a-a50cdb576b2e resourceVersion: "22033" uid: ba5b399f-9d39-4536-853a-2b556d56f0e0 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE4OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-23T08:10:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2e2ab5b2-b7a0-4da3-8dd2-0a3d5e4090ca"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T08:10:57Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T08:46:58Z" name: cluster-image-registry-operator-dockercfg-bvhhd namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 2e2ab5b2-b7a0-4da3-8dd2-0a3d5e4090ca resourceVersion: "21875" uid: eaabf0c2-3720-4393-a925-e2726091e805 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-23T08:10:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"90c8b287-09d8-477f-8df3-1392f91a4be4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T08:10:57Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T08:46:58Z" name: default-dockercfg-78xvt namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 90c8b287-09d8-477f-8df3-1392f91a4be4 resourceVersion: "21866" uid: a67cc88f-83ae-461d-8172-77c564790588 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-23T08:11:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f9e24526-8eec-4afa-99c9-964ef833d567"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T08:11:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T08:47:03Z" name: deployer-dockercfg-sb6zk namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: f9e24526-8eec-4afa-99c9-964ef833d567 resourceVersion: "22026" uid: ff82974d-afe5-48d3-893c-f48c0b982b69 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:2da5a0e8f8ad948c3ce66c67c25013dcf1c00bafc4e441dce9340ed9e5a9537b creationTimestamp: "2026-04-23T08:10:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-23T08:10:30Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1964" uid: e63de153-1461-4257-b266-4121aadf9082 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-22T08:16:48Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 72f7739e-8e25-4a20-9883-88616bf10026 service.beta.openshift.io/expiry: "2028-04-22T08:16:48Z" creationTimestamp: "2026-04-23T08:16:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"72f7739e-8e25-4a20-9883-88616bf10026"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-23T08:16:49Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 72f7739e-8e25-4a20-9883-88616bf10026 resourceVersion: "7818" uid: 50bd760a-97e0-4801-a3a1-4b3ecdd16fd7 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-23T08:10:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-23T08:10:30Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1962" uid: c6c2672c-bfee-4450-8f2b-518e0bccee67 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-23T08:10:27Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-23T08:10:27Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1677" uid: aad14d72-3622-4d27-8f29-84e50381291e type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-23T08:10:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5af1db80-32ff-4d44-9dbb-3d26565bd45c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T08:10:58Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T08:46:58Z" name: node-ca-dockercfg-gk9j6 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 5af1db80-32ff-4d44-9dbb-3d26565bd45c resourceVersion: "21854" uid: 60ace254-7f15-4e2e-a43d-421f3c3f7b2c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-23T08:10:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f113016c-7893-483f-ab8a-35e8abbad28d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T08:10:58Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T08:46:58Z" name: pruner-dockercfg-htljv namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: f113016c-7893-483f-ab8a-35e8abbad28d resourceVersion: "21876" uid: aea724e1-8425-4176-b8d3-17cbd6fd5fd6 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-23T08:10:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6dbdb16e-a28a-4a90-aaba-48b4091431cd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T08:10:58Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T08:46:58Z" name: registry-dockercfg-fw7pg namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 6dbdb16e-a28a-4a90-aaba-48b4091431cd resourceVersion: "21872" uid: 02045074-a5e8-4af3-9559-c3ca30df6544 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "27831"