--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-03-18T16:40:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T16:40:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5d6403b4-0f37-44ce-b566-c7ef06531857"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:40:09Z" name: builder-dockercfg-5g6ht namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 5d6403b4-0f37-44ce-b566-c7ef06531857 resourceVersion: "3554" uid: e28e47ed-0e25-40af-80de-f3960e285885 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-03-18T16:40:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T16:40:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7f0101e2-6f95-406b-9624-8cbdbdb6d62d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:40:04Z" name: cluster-image-registry-operator-dockercfg-cbmgw namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 7f0101e2-6f95-406b-9624-8cbdbdb6d62d resourceVersion: "2767" uid: 669fb1f3-d8ac-4082-b039-bfda37021fd2 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-03-18T16:40:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T16:40:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c1ac9bea-439c-4bab-a018-27ae921e9b2d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:40:04Z" name: default-dockercfg-sztth namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: c1ac9bea-439c-4bab-a018-27ae921e9b2d resourceVersion: "2733" uid: 72d0f2d2-53df-480f-b258-d9da79f56945 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-03-18T16:40:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T16:40:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ee37891c-cdb3-47ba-9a63-7d7818b71158"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:40:09Z" name: deployer-dockercfg-kb78c namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: ee37891c-cdb3-47ba-9a63-7d7818b71158 resourceVersion: "3565" uid: dc5b42cd-f0b9-4fee-a0f5-2275f148d05c type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:9cff923cf8e536daefec6911255ad6e61d89867e2bf9a3ad56b44557c44d1898 creationTimestamp: "2026-03-18T16:39:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-03-18T16:39:52Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1888" uid: f721d246-cf9d-416b-af5c-21f14b50d8f1 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-03-17T16:44:17Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 7888ca4e-3631-458a-b8c3-da9e38029592 service.beta.openshift.io/expiry: "2028-03-17T16:44:17Z" creationTimestamp: "2026-03-18T16:44:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"7888ca4e-3631-458a-b8c3-da9e38029592"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-03-18T16:44:18Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 7888ca4e-3631-458a-b8c3-da9e38029592 resourceVersion: "7262" uid: d35dbfe4-7563-4314-bd84-dbb74a85bceb type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-03-18T16:39:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-03-18T16:39:52Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1887" uid: 08effece-116c-4041-bccd-6a1e2c158535 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-03-18T16:39:50Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-03-18T16:39:50Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1724" uid: 43b38fba-db54-4c67-b9ba-82f1fadd3369 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-03-18T16:40:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T16:40:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4761cdfb-a76b-44a7-9969-a72c92b08628"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:40:04Z" name: node-ca-dockercfg-lstmt namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 4761cdfb-a76b-44a7-9969-a72c92b08628 resourceVersion: "2776" uid: 533a6b14-f16c-4fc4-a558-a86afe2dcf56 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-03-18T16:40:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T16:40:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"76dbb876-e32f-4479-ba30-38c4383c55af"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:40:04Z" name: pruner-dockercfg-469xw namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 76dbb876-e32f-4479-ba30-38c4383c55af resourceVersion: "2770" uid: 09a6dcf6-7fc8-4200-8ee5-d5c23d6b3bc8 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-03-18T16:40:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T16:40:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9fde0cf1-607e-464e-bac7-635246740506"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:40:04Z" name: registry-dockercfg-27ljg namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 9fde0cf1-607e-464e-bac7-635246740506 resourceVersion: "2785" uid: 6bd1ecc9-bbf0-4bef-b55a-71a38b7bf564 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21765"