--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T20:01:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"df262b65-1e87-4f2f-b274-9697fd272063"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:01:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:37:40Z" name: builder-dockercfg-qpwfz namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: df262b65-1e87-4f2f-b274-9697fd272063 resourceVersion: "26229" uid: e6603b66-d266-4bc1-89f0-1c6acd176efb type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE4OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-20T20:01:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"088f3816-b392-423a-8a49-d1756b69ef26"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:01:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:37:35Z" name: cluster-image-registry-operator-dockercfg-2vq26 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 088f3816-b392-423a-8a49-d1756b69ef26 resourceVersion: "26062" uid: ea9cdc18-6543-40b4-9cd5-9987d0c9ca09 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T20:01:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9503a222-be32-4384-9eba-27480ec8b96d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:01:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:37:35Z" name: default-dockercfg-swzth namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 9503a222-be32-4384-9eba-27480ec8b96d resourceVersion: "26081" uid: bac9c770-4782-49fd-b361-efbd0789e856 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T20:01:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3b1440a6-9cd6-4014-a8e3-2e69b2d6da45"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:01:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:37:40Z" name: deployer-dockercfg-l8nsc namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 3b1440a6-9cd6-4014-a8e3-2e69b2d6da45 resourceVersion: "26227" uid: 2e267ae5-3c64-46b3-a764-5341595f946a type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:af9770bbfda4f31acc325ae00c55fed52ed7d169a3d856d487cea75a422b8047 creationTimestamp: "2026-04-20T20:01:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-20T20:01:04Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1914" uid: 9b5ee4eb-ba73-4b05-867c-10d1d24bb375 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T20:07:26Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 15010d6f-45cc-4c96-a6e2-39609f3bd8a2 service.beta.openshift.io/expiry: "2028-04-19T20:07:26Z" creationTimestamp: "2026-04-20T20:07:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"15010d6f-45cc-4c96-a6e2-39609f3bd8a2"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T20:07:27Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 15010d6f-45cc-4c96-a6e2-39609f3bd8a2 resourceVersion: "7770" uid: daf3da32-16ef-4423-9de9-1e92536e87c6 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-20T20:01:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-20T20:01:04Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1913" uid: 07d98cc1-b844-40f4-94fb-779f98e9270b type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-20T20:01:02Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-20T20:01:02Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1828" uid: ba59504d-cd1f-4ccd-8bf0-7413d3d3f350 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-20T20:01:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6ef25fd8-55a7-4fc9-a97a-7487ebf571fc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:01:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:37:35Z" name: node-ca-dockercfg-s66wg namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 6ef25fd8-55a7-4fc9-a97a-7487ebf571fc resourceVersion: "26072" uid: 37e7222b-97ea-4ef0-9974-1d44e3940042 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-20T20:01:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"45458399-5b4b-400d-ba7e-93d25edac408"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:01:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:37:35Z" name: pruner-dockercfg-7hh67 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 45458399-5b4b-400d-ba7e-93d25edac408 resourceVersion: "26074" uid: 9ce85524-2246-41b1-afbb-831b1370f983 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-20T20:01:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bd4d96b9-d325-42a9-b257-6e809da8a20b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:01:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:37:35Z" name: registry-dockercfg-j7xv8 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: bd4d96b9-d325-42a9-b257-6e809da8a20b resourceVersion: "26079" uid: cd50b866-0062-41d1-9f44-275d04415486 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "33005"