--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-23T09:27:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"31007c67-bfb8-451a-972d-cce7e20b3ddc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T09:27:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T09:28:01Z" name: builder-dockercfg-mht4r namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 31007c67-bfb8-451a-972d-cce7e20b3ddc resourceVersion: "4052" uid: 3e729e48-252e-4d41-91da-cc3b7a65f87a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-23T09:27:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1288e066-1cdc-4e53-b7f4-3284479dbfb6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T09:27:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T09:27:59Z" name: cluster-image-registry-operator-dockercfg-6v45g namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 1288e066-1cdc-4e53-b7f4-3284479dbfb6 resourceVersion: "3909" uid: 0d5d33bf-a10b-4561-8844-14748e0d6d8b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-23T09:27:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b020cb7c-bf10-450c-afff-fbf35d1ef738"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T09:27:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T09:27:59Z" name: default-dockercfg-lv78z namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: b020cb7c-bf10-450c-afff-fbf35d1ef738 resourceVersion: "3910" uid: 95392589-2410-4c78-9e87-9f4c9844eeb4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-23T09:27:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2f1ab8e4-8976-4664-b088-249ca145f658"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T09:27:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T09:28:01Z" name: deployer-dockercfg-gzws9 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 2f1ab8e4-8976-4664-b088-249ca145f658 resourceVersion: "4053" uid: cb843206-c3f0-419a-a2ed-e88a6429c3c7 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a57865e44ac308db26034528d589cc245661d4196a81c02c6e18fd36515d8919 creationTimestamp: "2026-04-23T09:27:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-23T09:27:58Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "3806" uid: 2ca69cde-05dd-468a-9075-40b64749d556 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-22T09:31:35Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 4d00000c-7e06-475a-a304-d409cfc5b647 service.beta.openshift.io/expiry: "2028-04-22T09:31:35Z" creationTimestamp: "2026-04-23T09:31:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"4d00000c-7e06-475a-a304-d409cfc5b647"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-23T09:31:36Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 4d00000c-7e06-475a-a304-d409cfc5b647 resourceVersion: "7265" uid: ac4fa082-8c5d-47e2-b087-25eb522a729d type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-23T09:27:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-23T09:27:58Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "3805" uid: 9b9fc7de-bc68-4153-ae2d-443f63235f76 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-23T09:27:20Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-23T09:27:20Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1694" uid: 0ad93f44-ccf3-4e13-8847-c600374098db type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-23T09:27:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"09deef2f-ff5c-4fda-b038-91c325d9bce3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T09:27:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T09:27:59Z" name: node-ca-dockercfg-57kc9 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 09deef2f-ff5c-4fda-b038-91c325d9bce3 resourceVersion: "3908" uid: feca4936-db28-46da-8820-3391f0c31e33 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-23T09:27:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"730d3b4a-1dda-4570-8872-aa5d27aa0d9b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T09:27:57Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T09:28:02Z" name: pruner-dockercfg-7c8fw namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 730d3b4a-1dda-4570-8872-aa5d27aa0d9b resourceVersion: "4119" uid: 0a576b00-e506-47fd-bac6-6b5a9d466b75 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-23T09:27:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ace9144e-ed16-444b-8d97-6ec97cdc231f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T09:27:58Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T09:28:02Z" name: registry-dockercfg-shblk namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: ace9144e-ed16-444b-8d97-6ec97cdc231f resourceVersion: "4120" uid: 431643f9-cf76-4467-b17a-73b393e2e650 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "15979"