--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T13:55:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4c49d3d8-08c2-4929-a1f7-e547bfdeb4fd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:55:40Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:55:41Z" name: builder-dockercfg-lwnck namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 4c49d3d8-08c2-4929-a1f7-e547bfdeb4fd resourceVersion: "3684" uid: b465f981-7c41-4a55-8f45-12b137f8d876 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-16T13:55:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:55:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3669f7d6-f6cf-4ae5-9885-8f4e213b11d2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:55:35Z" name: cluster-image-registry-operator-dockercfg-fjm6t namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 3669f7d6-f6cf-4ae5-9885-8f4e213b11d2 resourceVersion: "3003" uid: a1aae888-438b-4c0b-bcb4-0239c7a3cc6e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T13:55:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:55:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2078ced4-f1de-4a73-8c5c-580d7ffa5cb0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:55:35Z" name: default-dockercfg-25cvb namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 2078ced4-f1de-4a73-8c5c-580d7ffa5cb0 resourceVersion: "3005" uid: e1bdde64-92d4-4a20-86bc-979bd1027381 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T13:55:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2615f224-219e-4c8e-913d-0337ccaa4ce0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:55:40Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:55:41Z" name: deployer-dockercfg-rjhg5 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 2615f224-219e-4c8e-913d-0337ccaa4ce0 resourceVersion: "3685" uid: 74bc4f4b-24d2-435c-ad0e-4202edbd156c type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:3b250339fa243ad4c3ad79149823e70c46a6c9074dd18a7a2c562636eaf7aff9 creationTimestamp: "2026-04-16T13:55:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T13:55:15Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1855" uid: c3d062f2-ba63-428e-a8c9-cd887feed6fa type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T14:01:26Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 154d9b94-e9a5-4a6a-b548-3323e954fdce service.beta.openshift.io/expiry: "2028-04-15T14:01:26Z" creationTimestamp: "2026-04-16T14:01:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"154d9b94-e9a5-4a6a-b548-3323e954fdce"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T14:01:27Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 154d9b94-e9a5-4a6a-b548-3323e954fdce resourceVersion: "7753" uid: 76492ada-5049-4a5d-aef7-bdd00a1062cd type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-16T13:55:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T13:55:15Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1853" uid: 9e077104-0a9a-42dd-a6c1-d0347a963e3c type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-16T13:55:13Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-16T13:55:13Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1662" uid: 1b2c23c1-6c2e-4bf1-9ec8-4670e30b6ca0 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-16T13:55:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:55:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9d2e8d32-85ad-4db5-9adc-e18b4e0a7eb1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:55:35Z" name: node-ca-dockercfg-xbllr namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 9d2e8d32-85ad-4db5-9adc-e18b4e0a7eb1 resourceVersion: "3006" uid: 7d97ba3f-0c44-4dbe-8653-37509ce33582 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-16T13:55:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:55:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"87725b5a-1d22-419e-a1a8-ce4c87264b08"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:55:35Z" name: pruner-dockercfg-m7dkr namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 87725b5a-1d22-419e-a1a8-ce4c87264b08 resourceVersion: "3007" uid: 93e55ac3-4e60-49a3-a98e-4dca8799d880 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-16T13:55:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:55:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0e6c66d3-9bf4-4437-a00b-b81d78bbc82e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:55:35Z" name: registry-dockercfg-jfbd2 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 0e6c66d3-9bf4-4437-a00b-b81d78bbc82e resourceVersion: "3008" uid: 7631d4cc-6436-4be3-8fbc-60524940486a type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "37620"