--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T12:49:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"09bf058b-6d5c-4d6d-93df-912532a74d5e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T12:49:23Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T13:25:23Z" name: builder-dockercfg-pljb5 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 09bf058b-6d5c-4d6d-93df-912532a74d5e resourceVersion: "21569" uid: a06cdd08-4383-4514-b776-d1e450cc67d3 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-17T12:49:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a2a3dd54-9abb-48a1-89f8-51d45218515e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T12:49:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T13:25:18Z" name: cluster-image-registry-operator-dockercfg-5p4b4 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: a2a3dd54-9abb-48a1-89f8-51d45218515e resourceVersion: "21398" uid: cc920fc1-96a9-4215-8eae-919f9900e66a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T12:49:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"66ae9ee2-0bc8-4648-8604-170a9f3810a2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T12:49:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T13:25:18Z" name: default-dockercfg-8mhs6 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 66ae9ee2-0bc8-4648-8604-170a9f3810a2 resourceVersion: "21392" uid: 93f3ee9e-9d0f-4e48-ab48-8668dc95db0e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T12:49:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"77f02722-fa77-46c9-9b92-5aa75f6cf18e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T12:49:23Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T13:25:23Z" name: deployer-dockercfg-8n2jd namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 77f02722-fa77-46c9-9b92-5aa75f6cf18e resourceVersion: "21548" uid: fbbeff86-c0b0-4852-ae98-c0f83f957d25 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:5e092d6fa12523181bff253b556c28e07295687c9ac2c6ecd0db2dd06056e4ce creationTimestamp: "2026-04-17T12:49:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T12:49:02Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "2007" uid: 1a9a1830-df15-4d36-807c-d6a539bb068a type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T12:55:03Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 020328da-d04f-4919-b8f4-ebb8c225bc6b service.beta.openshift.io/expiry: "2028-04-16T12:55:03Z" creationTimestamp: "2026-04-17T12:55:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"020328da-d04f-4919-b8f4-ebb8c225bc6b"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T12:55:04Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 020328da-d04f-4919-b8f4-ebb8c225bc6b resourceVersion: "7660" uid: 0309b8da-ceda-4331-8fa0-72da9e0503fd type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-17T12:49:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T12:49:02Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "2005" uid: fdb8a388-5aa7-4f85-a933-61f5a2447c2d type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-17T12:48:59Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-17T12:48:59Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1659" uid: 7669a602-9d6c-4831-9b65-97de53ff5f3d type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-17T12:49:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4a1d065e-c143-4ad3-8f51-e960a283f28c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T12:49:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T13:25:18Z" name: node-ca-dockercfg-jxbnj namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 4a1d065e-c143-4ad3-8f51-e960a283f28c resourceVersion: "21395" uid: 6b3a60b1-b9a6-4142-a20e-a2cb43f5e41b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-17T12:49:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"344237f3-2f19-4c42-80e4-a27224d0e884"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T12:49:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T13:25:18Z" name: pruner-dockercfg-vf294 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 344237f3-2f19-4c42-80e4-a27224d0e884 resourceVersion: "21410" uid: ca1a36a1-70ce-4828-9cce-5dd704a019fd type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-17T12:49:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"74854b6c-6e9f-496e-8098-1020de0d9b9e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T12:49:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T13:25:18Z" name: registry-dockercfg-q8fxr namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 74854b6c-6e9f-496e-8098-1020de0d9b9e resourceVersion: "21408" uid: 9ba9981d-b608-421f-a72e-9a10ec0807a8 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "27401"