--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T17:20:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d7108a39-936b-4ee2-9021-32f3960c95aa"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:20:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:56:30Z" name: builder-dockercfg-685b8 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: d7108a39-936b-4ee2-9021-32f3960c95aa resourceVersion: "26334" uid: 9289b051-a9c6-472e-a681-a9299b6f1d20 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-17T17:20:24Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"efaef6fc-277d-4a47-9676-72e1cce68e3b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:20:24Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:56:25Z" name: cluster-image-registry-operator-dockercfg-78m8z namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: efaef6fc-277d-4a47-9676-72e1cce68e3b resourceVersion: "26170" uid: 82073e86-11de-4882-bba4-3eb6b27045fb type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T17:20:24Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8197e23b-c71b-44f1-8639-00659a3513c0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:20:24Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:56:25Z" name: default-dockercfg-gng4c namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 8197e23b-c71b-44f1-8639-00659a3513c0 resourceVersion: "26156" uid: 23679f4e-b36d-44ec-997a-73bd8ddf80c8 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T17:20:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8f56d5b6-8535-42a1-8ca3-ab205bd717b5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:20:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:56:30Z" name: deployer-dockercfg-nmj62 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 8f56d5b6-8535-42a1-8ca3-ab205bd717b5 resourceVersion: "26316" uid: 2f9f1d78-89e3-4bdb-a87c-cddadf7c9e4d type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:c1256cfefc2338b4b559b415843ba84b2b877455e49770854eb189862fbec8ab creationTimestamp: "2026-04-17T17:20:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T17:20:01Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "2141" uid: fee422ef-aa09-4656-b429-6f0d9cb00744 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T17:26:05Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: dbc9ae8e-6a33-4b3f-9b11-305831c735df service.beta.openshift.io/expiry: "2028-04-16T17:26:05Z" creationTimestamp: "2026-04-17T17:26:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"dbc9ae8e-6a33-4b3f-9b11-305831c735df"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T17:26:06Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: dbc9ae8e-6a33-4b3f-9b11-305831c735df resourceVersion: "7692" uid: 36142b09-5865-4406-8cf4-3b5b035d50d0 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-17T17:20:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T17:20:01Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "2139" uid: 9ef37358-66a2-4e60-a885-7a633571adaf type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-17T17:19:56Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-17T17:19:56Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1743" uid: 0a078697-8dfa-4646-a053-d481b114a893 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-17T17:20:24Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d5db235a-641f-44ce-9ff4-58e3e09bafab"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:20:24Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:56:25Z" name: node-ca-dockercfg-pgjpq namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: d5db235a-641f-44ce-9ff4-58e3e09bafab resourceVersion: "26157" uid: 4f139f47-7ea6-4d1a-8f61-485a3e33ae00 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-17T17:20:24Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1a1f803d-6880-4a9b-a4e5-e3648ab2f1b9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:20:24Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:56:25Z" name: pruner-dockercfg-5dgt5 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 1a1f803d-6880-4a9b-a4e5-e3648ab2f1b9 resourceVersion: "26162" uid: 7e9b4eb1-f6e0-4590-ac29-02822ad3b70b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-17T17:20:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c884b5ce-3870-44c8-9660-544389b06496"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:20:25Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:56:25Z" name: registry-dockercfg-jk79w namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: c884b5ce-3870-44c8-9660-544389b06496 resourceVersion: "26166" uid: 39e3340d-68d2-44c9-826c-96f20a83744b type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "33356"