--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T19:19:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1781951d-2d8c-4df3-8b5d-d186eaf0912e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:19:42Z" name: builder-dockercfg-nsdft namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 1781951d-2d8c-4df3-8b5d-d186eaf0912e resourceVersion: "3325" uid: 2fdc942f-ddf2-4500-a5b1-f3038281dc21 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-22T19:19:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"dfb704a8-4b95-4282-88bc-9fd97659f73a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:19:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:38Z" name: cluster-image-registry-operator-dockercfg-vs7xq namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: dfb704a8-4b95-4282-88bc-9fd97659f73a resourceVersion: "2743" uid: 272a8ed1-9b0e-4f89-bc2c-c0b387e6d38c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T19:19:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"59acd4bc-91b6-45db-aca2-02379f89d566"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:19:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:38Z" name: default-dockercfg-xqn5j namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 59acd4bc-91b6-45db-aca2-02379f89d566 resourceVersion: "2764" uid: 3e61697b-3700-41c4-9d26-6ec79b57fbaf type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T19:19:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"94df3757-5541-4d09-af64-48e5d7ff48c7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:19:42Z" name: deployer-dockercfg-fp7nz namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 94df3757-5541-4d09-af64-48e5d7ff48c7 resourceVersion: "3335" uid: 3dfcb72c-ff56-4d86-af2a-2741312f5d8f type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:98568bce6696efd0787cc64ff81cb3227813fbe0c2e312b4bbdc143034df22f6 creationTimestamp: "2026-04-22T19:19:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T19:19:22Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1916" uid: 27a0d289-36e8-40a7-a828-b7a64141337e type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T19:25:35Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 83c2d580-c0b2-48e4-91bd-8bccea584ed5 service.beta.openshift.io/expiry: "2028-04-21T19:25:35Z" creationTimestamp: "2026-04-22T19:25:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"83c2d580-c0b2-48e4-91bd-8bccea584ed5"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T19:25:36Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 83c2d580-c0b2-48e4-91bd-8bccea584ed5 resourceVersion: "7730" uid: fbbaee3c-2c73-49aa-a721-4c66cad0df36 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-22T19:19:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T19:19:22Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1915" uid: f9e28236-5feb-434a-83f9-7ec95cee9ce6 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-22T19:19:20Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-22T19:19:20Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1755" uid: 9a7bf0cc-65fb-4755-af9b-7ebdf3840a74 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-22T19:19:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"75bab71c-99b2-4e58-a55d-cc232ee7bf4d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:19:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:38Z" name: node-ca-dockercfg-x97sx namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 75bab71c-99b2-4e58-a55d-cc232ee7bf4d resourceVersion: "2765" uid: 480b4a1f-dc9f-4ea1-83a0-6e6b47c24b2d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-22T19:19:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"14b6b329-2239-488a-8252-06910ffcf378"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:19:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:38Z" name: pruner-dockercfg-v7mhg namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 14b6b329-2239-488a-8252-06910ffcf378 resourceVersion: "2768" uid: 8b161f72-5a2c-4d43-bd0c-f26ea7831dc8 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-22T19:19:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"535d938a-2931-4bbf-af17-6e0fbe5fc354"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:19:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:38Z" name: registry-dockercfg-2jtv7 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 535d938a-2931-4bbf-af17-6e0fbe5fc354 resourceVersion: "2776" uid: 7925fc6f-8857-463b-ac91-6f33a10a5e54 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21546"