--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T16:19:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f197d7c0-f9f5-46f8-86af-031706c08398"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T16:19:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T16:55:09Z" name: builder-dockercfg-mf6zx namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: f197d7c0-f9f5-46f8-86af-031706c08398 resourceVersion: "38081" uid: 8654bd9b-edf2-455f-821b-13f41ebeca78 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-16T16:19:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5b7453a2-a485-492c-bbb0-70867bd7ce6a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T16:19:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T16:55:04Z" name: cluster-image-registry-operator-dockercfg-xtdx5 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 5b7453a2-a485-492c-bbb0-70867bd7ce6a resourceVersion: "37899" uid: 527e2b46-1f8a-4ffc-8d03-98be07554757 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T16:19:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"633f7517-bda8-4a4b-aa1a-1d50f148dc6a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T16:19:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T16:55:04Z" name: default-dockercfg-zjrrq namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 633f7517-bda8-4a4b-aa1a-1d50f148dc6a resourceVersion: "37893" uid: b22309da-0d12-490b-8059-2c17ac420563 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T16:19:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"573a0600-5971-4976-86eb-adbddb2112d7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T16:19:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T16:55:09Z" name: deployer-dockercfg-qdn8g namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 573a0600-5971-4976-86eb-adbddb2112d7 resourceVersion: "38085" uid: 317a7b85-992c-4ae4-beea-719b1a989eaa type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:768f6c82080b411d83857ab78e96f71fa0bf8f445fd14ee17d64143a33395c5b creationTimestamp: "2026-04-16T16:18:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T16:18:32Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1824" uid: b63f3c08-76ac-425b-af3d-97cb29b87148 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T16:24:47Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: d5f0779b-2621-4f8b-8af8-4315470ae55f service.beta.openshift.io/expiry: "2028-04-15T16:24:47Z" creationTimestamp: "2026-04-16T16:24:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"d5f0779b-2621-4f8b-8af8-4315470ae55f"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T16:24:48Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: d5f0779b-2621-4f8b-8af8-4315470ae55f resourceVersion: "7776" uid: 006c912d-9f25-4d5b-b644-7f33b76a15d3 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-16T16:18:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T16:18:32Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1823" uid: 9f81a96e-015a-48b4-b9b0-8b4da207be2a type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-16T16:18:30Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-16T16:18:30Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1728" uid: e7cdd433-8980-4f0f-bf9d-1f334bd1008c type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-16T16:19:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9a7ba77a-d5de-4098-9fea-39c272d92f02"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T16:19:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T16:55:04Z" name: node-ca-dockercfg-nx66x namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 9a7ba77a-d5de-4098-9fea-39c272d92f02 resourceVersion: "37889" uid: d7b05e87-e57b-461c-a25f-06da3cbb61af type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-16T16:19:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5d5bf3dd-f364-4d52-88d3-eb960c5d1334"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T16:19:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T16:55:04Z" name: pruner-dockercfg-zh575 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 5d5bf3dd-f364-4d52-88d3-eb960c5d1334 resourceVersion: "37904" uid: c0a87758-ff77-49ed-ad13-31a10e65b6e8 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-16T16:19:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9d6eaf28-7a02-422f-806f-daed7b2e43fb"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T16:19:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T16:55:04Z" name: registry-dockercfg-dwggv namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 9d6eaf28-7a02-422f-806f-daed7b2e43fb resourceVersion: "37894" uid: d40f5b3c-c8e9-4c78-b867-bfc9d727d1d3 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "38653"