--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T15:04:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bf230d9d-fbfa-4e5f-aa55-9fb611be37ca"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:04:52Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:04:53Z" name: builder-dockercfg-jc2jz namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: bf230d9d-fbfa-4e5f-aa55-9fb611be37ca resourceVersion: "3857" uid: 37804f3b-b7f2-4236-9883-b3d71e8fe444 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-22T15:04:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:04:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"124a12b0-6265-429a-a527-42d92455cbb2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:04:47Z" name: cluster-image-registry-operator-dockercfg-8mbdb namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 124a12b0-6265-429a-a527-42d92455cbb2 resourceVersion: "3131" uid: f97efd5c-d638-4a3c-9236-5c8b34947fc3 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T15:04:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:04:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"80f2fe28-b87c-44a6-a138-b608f6706df2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:04:47Z" name: default-dockercfg-cvh97 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 80f2fe28-b87c-44a6-a138-b608f6706df2 resourceVersion: "3137" uid: d191edde-546a-4ba4-87df-759ebc9450a1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T15:04:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"76baeb25-8be3-422e-88c4-f7f60b734baa"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:04:52Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:04:53Z" name: deployer-dockercfg-2zcjj namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 76baeb25-8be3-422e-88c4-f7f60b734baa resourceVersion: "3862" uid: 262bb873-f6b5-491e-9d1f-7806f8a565e3 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:2b2b9a5dda6e7489cbfd98a0a96f83b96eb7cc0a4110597b32b2cdd120989d31 creationTimestamp: "2026-04-22T15:04:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T15:04:25Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1935" uid: 67aa46a5-b9e7-417a-aef6-a25ddd11bcfa type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T15:10:50Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: ad904a10-f964-433d-b5c5-007ca7bbb36b service.beta.openshift.io/expiry: "2028-04-21T15:10:50Z" creationTimestamp: "2026-04-22T15:10:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"ad904a10-f964-433d-b5c5-007ca7bbb36b"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T15:10:51Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: ad904a10-f964-433d-b5c5-007ca7bbb36b resourceVersion: "7847" uid: 970608c3-c8ee-43a5-9794-e7184ac85438 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-22T15:04:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T15:04:25Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1930" uid: d60e42e2-0ee9-4b71-9906-ae5b3327724d type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-22T15:04:22Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-22T15:04:22Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1682" uid: 8dc41a63-d474-4089-97a4-4eef3c1f9462 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-22T15:04:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:04:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"eb4d18bb-c34d-4806-a3c1-97eb01b57daa"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:04:47Z" name: node-ca-dockercfg-42w7s namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: eb4d18bb-c34d-4806-a3c1-97eb01b57daa resourceVersion: "3144" uid: 927e3735-95fe-4b21-b4f1-33f4ed354221 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-22T15:04:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:04:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"978a479a-68b7-4ea1-844c-25cab0ae152b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:04:47Z" name: pruner-dockercfg-s44s6 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 978a479a-68b7-4ea1-844c-25cab0ae152b resourceVersion: "3150" uid: 3e747155-5bd5-4451-9628-75431fcbca87 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-22T15:04:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:04:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"67f7a68d-7b79-47d7-bbec-36cefa2ca84b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:04:47Z" name: registry-dockercfg-dblpk namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 67f7a68d-7b79-47d7-bbec-36cefa2ca84b resourceVersion: "3151" uid: 8f3ec0bf-8a95-4c90-a690-210c3f3a8b25 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "18148"