--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T15:59:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e7e4084d-e1e5-4adf-a89d-00ac417ddf5a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T15:59:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T16:35:36Z" name: builder-dockercfg-4pnxw namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: e7e4084d-e1e5-4adf-a89d-00ac417ddf5a resourceVersion: "25391" uid: e5b67838-741d-4e58-9d7c-acb010cbc233 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-16T15:59:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d29c5707-a62a-4862-83b2-0d45fc854f5d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T15:59:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T16:35:31Z" name: cluster-image-registry-operator-dockercfg-wk7kb namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: d29c5707-a62a-4862-83b2-0d45fc854f5d resourceVersion: "25238" uid: 5c2c61ad-2661-43b3-9539-7a6d5c151826 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T15:59:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"05fd4ae3-e75b-4273-9df8-86eb8d6865cc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T15:59:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T16:35:31Z" name: default-dockercfg-dmhxt namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 05fd4ae3-e75b-4273-9df8-86eb8d6865cc resourceVersion: "25218" uid: 91d03380-a20d-4173-9c33-4eb6db542303 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T15:59:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"08611337-bea1-493c-b147-6dc98588f36b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T15:59:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T16:35:36Z" name: deployer-dockercfg-9p9fh namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 08611337-bea1-493c-b147-6dc98588f36b resourceVersion: "25400" uid: 820162a5-dd3a-4e25-bbd8-26e048f14d34 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:f18a0a23b51429d091ebf119cbf7165f97c1620a3d8a9216da22b051470bcb0a creationTimestamp: "2026-04-16T15:59:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T15:59:05Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1914" uid: e997171d-530e-42e0-a3d6-0796c30e0b5d type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T16:05:31Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: c599802c-6832-494b-939f-6ba9a4549fdb service.beta.openshift.io/expiry: "2028-04-15T16:05:31Z" creationTimestamp: "2026-04-16T16:05:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"c599802c-6832-494b-939f-6ba9a4549fdb"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T16:05:32Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: c599802c-6832-494b-939f-6ba9a4549fdb resourceVersion: "7816" uid: a17e7023-9850-40c9-9f52-a0fd4b288dc1 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-16T15:59:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T15:59:05Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1913" uid: d6dddf12-48ee-4e34-a516-7f5303e6b4e6 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-16T15:59:03Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-16T15:59:03Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1817" uid: 44f26685-7672-44b7-8d7f-39e6bdbd316b type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-16T15:59:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"02a73303-5a32-4376-987a-c81fb0e4f426"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T15:59:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T16:35:31Z" name: node-ca-dockercfg-fkwk5 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 02a73303-5a32-4376-987a-c81fb0e4f426 resourceVersion: "25231" uid: bfda6166-d557-4cdd-9540-aabc579b655c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-16T15:59:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"dbbf2021-b6a7-4cec-84ba-19d668515e66"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T15:59:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T16:35:31Z" name: pruner-dockercfg-5mwfs namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: dbbf2021-b6a7-4cec-84ba-19d668515e66 resourceVersion: "25223" uid: 69c9d36d-c2d1-4853-9d92-e3e903c79225 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-16T15:59:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bfae78df-846b-446a-a3ab-60b4ddc8df12"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T15:59:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T16:35:31Z" name: registry-dockercfg-5j7ls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: bfae78df-846b-446a-a3ab-60b4ddc8df12 resourceVersion: "25217" uid: 1754005b-5a53-4a4e-a6c8-bdb339ecba18 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "40504"