--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T20:01:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"51702197-7766-4ff5-8da9-939802fd5009"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:01:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:37:42Z" name: builder-dockercfg-qkrfp namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 51702197-7766-4ff5-8da9-939802fd5009 resourceVersion: "25278" uid: 859ba3aa-e496-4ad7-811d-473b13cf46dc type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-20T20:01:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"61029335-8276-451b-af8e-c1691f1b7ceb"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:01:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:37:38Z" name: cluster-image-registry-operator-dockercfg-v8z45 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 61029335-8276-451b-af8e-c1691f1b7ceb resourceVersion: "25134" uid: 4231cb52-89ee-45aa-913f-4917e61420cc type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T20:01:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a399328b-55a6-4c05-b971-54006548c9bf"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:01:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:37:38Z" name: default-dockercfg-49l7b namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: a399328b-55a6-4c05-b971-54006548c9bf resourceVersion: "25113" uid: 4ed0574b-482f-46ed-8e0d-5134f45c825d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T20:01:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9bea8fd2-70d9-4c4f-8a57-aa309e191eec"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:01:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:37:42Z" name: deployer-dockercfg-5kq2h namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 9bea8fd2-70d9-4c4f-8a57-aa309e191eec resourceVersion: "25270" uid: a0240af8-b6d8-4827-a755-20aceaac7e75 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:722a94e3e346126807a035035198b47179c0313479b7dc550f76bd2d96de37ab creationTimestamp: "2026-04-20T20:01:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-20T20:01:22Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1920" uid: dffbe6b4-1e1f-45fa-b9c0-92d634036966 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T20:08:02Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 89c40a5d-99c9-4116-8a45-9d5de85dd47b service.beta.openshift.io/expiry: "2028-04-19T20:08:02Z" creationTimestamp: "2026-04-20T20:08:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"89c40a5d-99c9-4116-8a45-9d5de85dd47b"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T20:08:03Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 89c40a5d-99c9-4116-8a45-9d5de85dd47b resourceVersion: "7875" uid: bedd1572-9981-47e8-b0bf-04c7adf9b38b type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-20T20:01:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-20T20:01:22Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1918" uid: 00d9c82b-583b-44d3-ac9d-2b7d1e8ab6b5 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-20T20:01:20Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-20T20:01:20Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1801" uid: 61a6fad5-c4d8-4351-85d4-9e352fea44fe type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-20T20:01:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a09f8279-4ac2-40d0-88f3-e68cce69f584"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:01:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:37:38Z" name: node-ca-dockercfg-n2vgw namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: a09f8279-4ac2-40d0-88f3-e68cce69f584 resourceVersion: "25112" uid: 66181b37-ea82-4315-ab9e-6549546b4153 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-20T20:01:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"86917b9c-902d-4a0f-b542-c929e68fdd97"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:01:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:37:38Z" name: pruner-dockercfg-q8zpp namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 86917b9c-902d-4a0f-b542-c929e68fdd97 resourceVersion: "25123" uid: 3c7c23bd-e0e5-4069-8473-ea47231939e8 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-20T20:01:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"49da380c-d3cc-4ee8-80a2-3a5a356d7e45"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:01:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:37:38Z" name: registry-dockercfg-dhv99 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 49da380c-d3cc-4ee8-80a2-3a5a356d7e45 resourceVersion: "25118" uid: 33532585-d243-4a48-a87c-d404e7f74407 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "42986"