--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-23T08:47:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T08:47:43Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"42b305dd-bf5f-43ac-a96d-4bb3c8312f71"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T08:47:43Z" name: builder-dockercfg-kbxxg namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 42b305dd-bf5f-43ac-a96d-4bb3c8312f71 resourceVersion: "4112" uid: 1e444655-2a06-46d8-a524-985bd3661229 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-23T08:47:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T08:47:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ddd6d258-7ee4-44c6-84df-abe1d7d84421"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T08:47:37Z" name: cluster-image-registry-operator-dockercfg-mbbhz namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: ddd6d258-7ee4-44c6-84df-abe1d7d84421 resourceVersion: "3443" uid: bcc3001e-d972-4dda-9b59-c3dcc35f90e7 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-23T08:47:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T08:47:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0c1aee61-6a1f-4a57-b331-7d6e8223d248"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T08:47:37Z" name: default-dockercfg-x4hfp namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 0c1aee61-6a1f-4a57-b331-7d6e8223d248 resourceVersion: "3447" uid: e451cc7c-d8e1-41a8-b035-2a749b18ad17 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-23T08:47:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T08:47:43Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"86fe64ab-f038-4fc3-9aaa-ecaef7994a2d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T08:47:43Z" name: deployer-dockercfg-p8zpq namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 86fe64ab-f038-4fc3-9aaa-ecaef7994a2d resourceVersion: "4108" uid: 3fb6c00e-0d0e-4caa-97f7-8ecb30d0239f type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:11bd8f49a8533276ed766a75c72ba7daa9d05d7eeccd74f0d223b05f83175733 creationTimestamp: "2026-04-23T08:47:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-23T08:47:06Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1911" uid: f119da2e-86af-490d-b904-d6c59fb8276d type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-22T08:53:09Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 7f68864e-49c7-4696-9101-a7e9d9ecb691 service.beta.openshift.io/expiry: "2028-04-22T08:53:09Z" creationTimestamp: "2026-04-23T08:53:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"7f68864e-49c7-4696-9101-a7e9d9ecb691"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-23T08:53:10Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 7f68864e-49c7-4696-9101-a7e9d9ecb691 resourceVersion: "7648" uid: ada16bde-a8f4-4dcd-b9d8-8171f0221fdf type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-23T08:47:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-23T08:47:06Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1902" uid: cd16b0d0-b1d0-45d4-93e8-8929d576a66e type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-23T08:47:03Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-23T08:47:03Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1638" uid: 800e489a-d60d-4d97-8fb8-a1725400d1cd type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-23T08:47:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T08:47:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6b62f81d-c261-4362-b357-fff9dadd7175"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T08:47:37Z" name: node-ca-dockercfg-2snlq namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 6b62f81d-c261-4362-b357-fff9dadd7175 resourceVersion: "3453" uid: 6541a2ef-2828-4865-af14-92f0a4c5f1ea type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-23T08:47:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bb64b76c-195c-42e2-a8a7-a9e43b061aae"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T08:47:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T08:47:38Z" name: pruner-dockercfg-jpk4v namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: bb64b76c-195c-42e2-a8a7-a9e43b061aae resourceVersion: "3458" uid: f00f3350-3254-4477-b9c2-738f32b84701 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-23T08:47:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"82aad92c-d76f-4991-9bc3-bca201a5e21c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T08:47:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T08:47:38Z" name: registry-dockercfg-48746 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 82aad92c-d76f-4991-9bc3-bca201a5e21c resourceVersion: "3462" uid: 660c51f9-764c-433e-a212-e1eef083021c type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "16048"