--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-03-18T16:41:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T16:41:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"81f8bfe1-4530-4378-9746-8c416fbae09a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:41:09Z" name: builder-dockercfg-7wlwr namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 81f8bfe1-4530-4378-9746-8c416fbae09a resourceVersion: "3809" uid: b4c33db1-5282-4e0c-93b8-4153856f7105 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-03-18T16:41:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T16:41:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b162f1cc-8a2c-400e-a0d6-5e0550f27865"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:41:04Z" name: cluster-image-registry-operator-dockercfg-mrt78 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: b162f1cc-8a2c-400e-a0d6-5e0550f27865 resourceVersion: "3169" uid: 0e1fd93a-100a-4739-9c0f-4d840e8ec2ed type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-03-18T16:41:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T16:41:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"feee47fd-1bbe-4600-a97c-b12ae7531575"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:41:04Z" name: default-dockercfg-m8wqf namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: feee47fd-1bbe-4600-a97c-b12ae7531575 resourceVersion: "3178" uid: 6b895f75-0554-4332-8b8a-e25f4bd5afb6 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-03-18T16:41:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T16:41:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"47c06012-51ce-4dc3-aa89-7048beb1a85c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:41:09Z" name: deployer-dockercfg-nsw5d namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 47c06012-51ce-4dc3-aa89-7048beb1a85c resourceVersion: "3800" uid: 43353b38-b355-4cdc-bf9e-c4313297966f type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:5d1390f83cd658236667dbea7420d111e890bbb6e0c830d6dd01dc7722996944 creationTimestamp: "2026-03-18T16:40:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-03-18T16:40:35Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1753" uid: 1ab2f707-1d4a-4e3c-b2dc-66e055667029 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-03-17T16:47:01Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 806ccba0-0713-453d-9f9c-65a852bc3050 service.beta.openshift.io/expiry: "2028-03-17T16:47:01Z" creationTimestamp: "2026-03-18T16:47:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"806ccba0-0713-453d-9f9c-65a852bc3050"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-03-18T16:47:01Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 806ccba0-0713-453d-9f9c-65a852bc3050 resourceVersion: "6613" uid: 670449c4-3e8c-4be4-84e0-a2f45fadf3c1 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-03-18T16:40:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-03-18T16:40:35Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1752" uid: 29e19db5-3d17-470f-a4cb-38ded49482d1 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-03-18T16:40:34Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-03-18T16:40:34Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1655" uid: dc82f83c-ef3b-46ac-b4af-fcb490ecd549 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-03-18T16:41:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T16:41:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3d804da1-414d-4668-8fd6-1feb00c60144"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:41:04Z" name: node-ca-dockercfg-pxc2z namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 3d804da1-414d-4668-8fd6-1feb00c60144 resourceVersion: "3179" uid: bb724e83-6e65-42a5-a911-9ceaac75428b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-03-18T16:41:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T16:41:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2c18ed2a-3f4e-4ed9-a956-e93ada1dc433"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:41:04Z" name: pruner-dockercfg-7gc99 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 2c18ed2a-3f4e-4ed9-a956-e93ada1dc433 resourceVersion: "3180" uid: 98006389-2b1a-441e-b069-d5777580b8a4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-03-18T16:41:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T16:41:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"63e2c15f-a49c-4bef-a5c1-fcb046f83f1f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:41:04Z" name: registry-dockercfg-8k48n namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 63e2c15f-a49c-4bef-a5c1-fcb046f83f1f resourceVersion: "3190" uid: 946a57e7-118b-42bf-94b1-797c535c0717 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "19481"