--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T15:59:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"603d6362-7313-49a8-be18-7a48cd852578"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T15:59:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:59:16Z" name: builder-dockercfg-cnckj namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 603d6362-7313-49a8-be18-7a48cd852578 resourceVersion: "3383" uid: 1c41595f-fe70-4018-a51f-06a49cfed644 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-16T15:59:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"85c40647-3f21-402d-9d9a-3c7078ced202"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T15:59:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:59:11Z" name: cluster-image-registry-operator-dockercfg-7zm6j namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 85c40647-3f21-402d-9d9a-3c7078ced202 resourceVersion: "2624" uid: 238f8bc5-33ba-4164-a13e-e92c19a0a50b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T15:59:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a330ca2f-5614-4d24-a1e5-55b6fd2306f6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T15:59:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:59:11Z" name: default-dockercfg-r9ndn namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: a330ca2f-5614-4d24-a1e5-55b6fd2306f6 resourceVersion: "2625" uid: 578a9959-1341-439e-aed7-faa260435113 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T15:59:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"858ad399-4328-40ec-8f0f-72fd2670e29e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T15:59:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:59:16Z" name: deployer-dockercfg-88s9k namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 858ad399-4328-40ec-8f0f-72fd2670e29e resourceVersion: "3388" uid: 1e1db28b-674f-4a17-bb19-d4ddc75d852c type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:d238692edd81b7c2894b33ca25eef062c1195b8a137492c691cfdb6be7559b68 creationTimestamp: "2026-04-16T15:59:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T15:59:00Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1939" uid: 6d44daef-1251-4ae3-a99d-b0a4ee5df3e1 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T16:05:29Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 7b299cde-a9c4-4690-825a-f677536b5465 service.beta.openshift.io/expiry: "2028-04-15T16:05:29Z" creationTimestamp: "2026-04-16T16:05:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"7b299cde-a9c4-4690-825a-f677536b5465"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T16:05:30Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 7b299cde-a9c4-4690-825a-f677536b5465 resourceVersion: "7896" uid: 9ddb5009-b181-435b-b5cb-d523c902b3e2 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-16T15:59:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T15:59:00Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1938" uid: a02ac3d9-45a8-4cdc-a496-01c71b4c4bf3 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-16T15:58:57Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-16T15:58:57Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1763" uid: 5a8376fc-59bd-4435-bee9-a54e3c9fc72d type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-16T15:59:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6738bf6e-8a09-4484-ab1f-1049d298d3e6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T15:59:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:59:11Z" name: node-ca-dockercfg-7lvrj namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 6738bf6e-8a09-4484-ab1f-1049d298d3e6 resourceVersion: "2655" uid: 8e5ff76d-5ea7-47cb-9a64-8a5ceb6032cb type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-16T15:59:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8f102745-ed10-440d-8291-29d6f99405fd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T15:59:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:59:11Z" name: pruner-dockercfg-lwlm4 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 8f102745-ed10-440d-8291-29d6f99405fd resourceVersion: "2666" uid: 071ecec0-81d3-4878-a1f2-9e4a7e333a54 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-16T15:59:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b8eb4d85-c2bb-49a2-a282-f04a2f56d1e7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T15:59:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:59:11Z" name: registry-dockercfg-6298j namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: b8eb4d85-c2bb-49a2-a282-f04a2f56d1e7 resourceVersion: "2661" uid: f0f01b0f-6f22-4064-8b78-190c6d011533 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21365"