--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T13:53:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:53:56Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"eb4d487f-ba53-4a9b-ba11-1d95763e584c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:53:56Z" name: builder-dockercfg-6n6z9 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: eb4d487f-ba53-4a9b-ba11-1d95763e584c resourceVersion: "4018" uid: 19bca6ca-84a1-4bf5-ad23-e682c9eff885 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-16T13:53:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:53:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bff2ab33-0293-4b7a-9003-654ab76d6222"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:53:50Z" name: cluster-image-registry-operator-dockercfg-lrqbx namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: bff2ab33-0293-4b7a-9003-654ab76d6222 resourceVersion: "3397" uid: 221e35dc-d613-4b2b-8155-39935584cc99 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T13:53:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ff983dfc-30bf-4024-a18d-52b29d681616"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:53:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:53:51Z" name: default-dockercfg-khnhb namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: ff983dfc-30bf-4024-a18d-52b29d681616 resourceVersion: "3413" uid: f1a051d0-1ae7-414a-8835-c03a9269a7ca type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T13:53:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:53:56Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fd2d29b8-65d7-4428-99f2-b3799e60d6d2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:53:56Z" name: deployer-dockercfg-c6ktf namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: fd2d29b8-65d7-4428-99f2-b3799e60d6d2 resourceVersion: "4016" uid: f6ef74eb-be16-4f09-8da2-c0e4f4508817 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:d496ce9850a2958d1d2dfbc6da0d6aafe727098e9c6f769d96e18c2a5044b095 creationTimestamp: "2026-04-16T13:53:24Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T13:53:24Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1999" uid: 6f1d4002-d1ee-48a3-a78c-c28bb63da2fd type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T13:59:55Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 60d4b967-9206-4564-869a-8ab5bdd0d002 service.beta.openshift.io/expiry: "2028-04-15T13:59:55Z" creationTimestamp: "2026-04-16T13:59:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"60d4b967-9206-4564-869a-8ab5bdd0d002"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T13:59:55Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 60d4b967-9206-4564-869a-8ab5bdd0d002 resourceVersion: "7941" uid: bd29110c-a1a4-4fc2-98e7-ff45965fa65b type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-16T13:53:24Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T13:53:24Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1998" uid: f829ed4d-1a8a-4985-bef5-ff78e7c2e86e type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-16T13:53:21Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-16T13:53:21Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1664" uid: 27263086-1517-4d6f-b9b1-dd3c5d6a9fce type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-16T13:53:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1e031051-219c-49e2-9f3c-1c7834567319"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:53:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:53:51Z" name: node-ca-dockercfg-7vmbj namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 1e031051-219c-49e2-9f3c-1c7834567319 resourceVersion: "3415" uid: 5938c7a7-5644-43f5-b1c7-070e951736ad type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-16T13:53:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cccbb40c-304a-40cc-9527-2db384ed4c61"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:53:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:53:51Z" name: pruner-dockercfg-b86d6 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: cccbb40c-304a-40cc-9527-2db384ed4c61 resourceVersion: "3419" uid: 680c0452-cf57-44d0-aad2-488e63aaab4a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-16T13:53:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b073214f-8caf-4c15-abe9-b3f248d00f05"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:53:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:53:51Z" name: registry-dockercfg-qt6qg namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: b073214f-8caf-4c15-abe9-b3f248d00f05 resourceVersion: "3421" uid: f91c169d-fbf2-4d62-81cb-d62c80d21c97 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21637"