--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-02-17T12:43:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f4182607-acdd-4ab3-8840-90e85d84535e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-02-17T12:43:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-02-17T12:43:11Z" name: builder-dockercfg-lcsfx namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: f4182607-acdd-4ab3-8840-90e85d84535e resourceVersion: "4036" uid: 6659e494-a35f-471d-b028-446d3b2f6c7e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-02-17T12:43:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-02-17T12:43:05Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"68ac9d5a-9e11-4713-ab0d-43cfc11348a9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-02-17T12:43:05Z" name: cluster-image-registry-operator-dockercfg-wmp4d namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 68ac9d5a-9e11-4713-ab0d-43cfc11348a9 resourceVersion: "3456" uid: 29c53ab6-d5f7-48ed-ac5b-e41a7dd8bdcf type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-02-17T12:43:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-02-17T12:43:05Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2e345180-0195-4651-969f-b53347a429a1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-02-17T12:43:05Z" name: default-dockercfg-sz6vb namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 2e345180-0195-4651-969f-b53347a429a1 resourceVersion: "3459" uid: 41aee1e8-2a3c-4883-8cdb-6c286b479e41 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-02-17T12:43:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1948057f-c60c-4038-8cc5-d02e46f7f0c0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-02-17T12:43:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-02-17T12:43:11Z" name: deployer-dockercfg-6ljpc namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 1948057f-c60c-4038-8cc5-d02e46f7f0c0 resourceVersion: "4039" uid: 59da67f2-0060-4dac-a2dd-97a1fc8dd65e type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:1f2420a706094aee43b8e58bf3929182bb69ec02ce248b9c05354deddef8fe4a creationTimestamp: "2026-02-17T12:42:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-02-17T12:42:33Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1901" uid: 48a554b0-7850-486d-a56b-49f63e96cdca type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-02-17T12:49:03Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 957ed3e3-756a-4662-b3d1-b59695ab7eb8 service.beta.openshift.io/expiry: "2028-02-17T12:49:03Z" creationTimestamp: "2026-02-17T12:49:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"957ed3e3-756a-4662-b3d1-b59695ab7eb8"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-02-17T12:49:04Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 957ed3e3-756a-4662-b3d1-b59695ab7eb8 resourceVersion: "7943" uid: fd9806d1-61ff-4335-bd09-8a5da92b51f8 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-02-17T12:42:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-02-17T12:42:33Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1896" uid: 10016e2d-5786-4dcf-9016-e51985c46fc6 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-02-17T12:42:30Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-02-17T12:42:30Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1661" uid: f0417360-7e54-49df-abdc-05c8b182ed57 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-02-17T12:43:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-02-17T12:43:05Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b05b3690-6091-407c-80bb-3e973cb2f51f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-02-17T12:43:05Z" name: node-ca-dockercfg-nj8cg namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: b05b3690-6091-407c-80bb-3e973cb2f51f resourceVersion: "3467" uid: 13802c5a-2191-4589-9672-084fe2b0b12e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-02-17T12:43:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-02-17T12:43:05Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2cfe3e28-9a33-4962-a49a-1dae84993d28"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-02-17T12:43:05Z" name: pruner-dockercfg-4b4z5 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 2cfe3e28-9a33-4962-a49a-1dae84993d28 resourceVersion: "3468" uid: 0b5a0f91-9403-4773-b3fd-6d7417672a36 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-02-17T12:43:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-02-17T12:43:05Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2979cbaa-017e-4ace-a9f1-8e21d4968c24"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-02-17T12:43:05Z" name: registry-dockercfg-68g2c namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 2979cbaa-017e-4ace-a9f1-8e21d4968c24 resourceVersion: "3474" uid: a2467145-4707-4020-a256-10e0ef83e6cd type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "18904"