--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T18:14:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b08c0d5f-7f8d-41fc-9b7c-abe0dc0cd0f5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:14:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:50:23Z" name: builder-dockercfg-ftwgr namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: b08c0d5f-7f8d-41fc-9b7c-abe0dc0cd0f5 resourceVersion: "26041" uid: 0e6068e1-5f93-4db9-ba13-ba4ed7111d17 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-16T18:14:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"13bfdc3b-8b27-4c0e-8389-6cd70dafe173"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:14:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:50:19Z" name: cluster-image-registry-operator-dockercfg-569jx namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 13bfdc3b-8b27-4c0e-8389-6cd70dafe173 resourceVersion: "25855" uid: 5b1020cf-4621-4eee-b172-892abc1740f9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T18:14:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"640e43fb-223a-4bee-a64e-b1848b16c81f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:14:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:50:19Z" name: default-dockercfg-fth7x namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 640e43fb-223a-4bee-a64e-b1848b16c81f resourceVersion: "25858" uid: 513f8989-80e0-47aa-9d1b-5ceb0c4d3fc5 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T18:14:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f52a4c33-0a17-40bd-8f86-dea408cb9810"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:14:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:50:23Z" name: deployer-dockercfg-4hjmz namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: f52a4c33-0a17-40bd-8f86-dea408cb9810 resourceVersion: "26040" uid: 3969bb4b-da58-4b5e-b95d-d6940f4de33b type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:8aef64125b854b4dba36cb499333322f155975ba3997f5aafde4f0ecab16dd4d creationTimestamp: "2026-04-16T18:14:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T18:14:03Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "2016" uid: f357d489-ba20-4c82-9a31-16ace0b08a72 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T18:20:07Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 410457a0-6122-48ca-8f35-848604aeb61f service.beta.openshift.io/expiry: "2028-04-15T18:20:07Z" creationTimestamp: "2026-04-16T18:20:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"410457a0-6122-48ca-8f35-848604aeb61f"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T18:20:08Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 410457a0-6122-48ca-8f35-848604aeb61f resourceVersion: "7750" uid: 5d59f537-c4dc-455b-8b20-6bb525452a9e type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-16T18:14:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T18:14:03Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "2014" uid: 6b47f932-daa2-4394-a277-3d1cd48ef760 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-16T18:13:59Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-16T18:13:59Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1741" uid: 729a03e4-862f-450a-92a6-e14a9189e7d7 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-16T18:14:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8a5b3004-a997-4aa0-924b-c87bdc46dca7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:14:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:50:19Z" name: node-ca-dockercfg-5n5rs namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 8a5b3004-a997-4aa0-924b-c87bdc46dca7 resourceVersion: "25863" uid: d8af1126-7cb6-4e1a-af5c-713f4ca06ad5 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-16T18:14:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d6ed3e0b-b247-4df4-aa48-6b2c394b488f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:14:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:50:19Z" name: pruner-dockercfg-mtw4v namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: d6ed3e0b-b247-4df4-aa48-6b2c394b488f resourceVersion: "25846" uid: 97423e67-156a-4a73-83e1-cbff9696edd9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-16T18:14:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b97287a6-c948-4943-b209-613e5642e91d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:14:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:50:19Z" name: registry-dockercfg-sb5br namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: b97287a6-c948-4943-b209-613e5642e91d resourceVersion: "25878" uid: 9b13f3d8-ceb8-41f3-a632-e718a898de17 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "33112"