--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T19:20:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5aaa5dad-169d-44b9-aeb1-c5076da8e6a4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:20:56Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:21:11Z" name: builder-dockercfg-wt4hr namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 5aaa5dad-169d-44b9-aeb1-c5076da8e6a4 resourceVersion: "4349" uid: 56fe4998-b1da-4505-87f4-276461e3a0f8 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-22T19:20:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"58dd3797-e983-40a2-8c67-c9c577f4cc41"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:20:53Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:21:09Z" name: cluster-image-registry-operator-dockercfg-zwnqm namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 58dd3797-e983-40a2-8c67-c9c577f4cc41 resourceVersion: "4175" uid: ec3feac5-aa8b-4477-942b-5aee67353776 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T19:20:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"dc26f133-fb52-4e4e-828e-987db61cfffa"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:20:53Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:21:09Z" name: default-dockercfg-5tx8m namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: dc26f133-fb52-4e4e-828e-987db61cfffa resourceVersion: "4173" uid: ec228a35-ee15-409d-ac95-b77b5e60fea6 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T19:20:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"632acb65-cdb6-417a-9a22-40fa11c4a232"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:20:56Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:21:11Z" name: deployer-dockercfg-9n2kp namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 632acb65-cdb6-417a-9a22-40fa11c4a232 resourceVersion: "4346" uid: f694497d-5bc4-4d3b-8dc1-52261967d54e type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:dfacc0f29f27bdb0df576d7ae2d082e97d5446d419510fe181335dcf8e182b88 creationTimestamp: "2026-04-22T19:21:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T19:21:09Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "4067" uid: 215eb728-31d6-4541-984e-3faa846d8714 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T19:26:38Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 5b9bf59e-0d14-4cea-ba96-3f3ab7624bee service.beta.openshift.io/expiry: "2028-04-21T19:26:38Z" creationTimestamp: "2026-04-22T19:26:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"5b9bf59e-0d14-4cea-ba96-3f3ab7624bee"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T19:26:39Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 5b9bf59e-0d14-4cea-ba96-3f3ab7624bee resourceVersion: "7809" uid: 73a5a947-8f55-46b8-b23b-76137eb72fe3 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-22T19:21:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T19:21:09Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "4065" uid: b551e6a1-ce9f-4b89-ae9f-2d84053bc0d8 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-22T19:20:24Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-22T19:20:24Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1794" uid: da3b7fff-2874-4533-8d0a-72b16f84c9e5 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-22T19:20:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f73d9bad-58b8-4ec8-a3b6-ed6f30d9281c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:20:53Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:21:09Z" name: node-ca-dockercfg-v5nhj namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: f73d9bad-58b8-4ec8-a3b6-ed6f30d9281c resourceVersion: "4177" uid: 3c41a724-ea45-4495-a4ac-b223071a8b07 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-22T19:21:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"61e12191-52af-47bc-8a2d-72ac3cd46765"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:21:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:21:13Z" name: pruner-dockercfg-zlcjb namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 61e12191-52af-47bc-8a2d-72ac3cd46765 resourceVersion: "4424" uid: e0d83a7c-eff0-4bf2-80cd-4cbffffbc235 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-22T19:21:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"90fa6073-6214-4bcb-a5c5-9abce0c38f28"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:21:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:21:13Z" name: registry-dockercfg-lccrt namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 90fa6073-6214-4bcb-a5c5-9abce0c38f28 resourceVersion: "4425" uid: ddd640ee-539f-452e-afbd-b2a9c4a905d7 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "36019"