--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T19:54:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"20a4c1ec-44b7-4e13-92b8-8ea5ddd22440"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:54:41Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:54:42Z" name: builder-dockercfg-wk9sn namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 20a4c1ec-44b7-4e13-92b8-8ea5ddd22440 resourceVersion: "3589" uid: 9828a685-1cac-4600-9769-680803bb0a9a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE4OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-22T19:54:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:54:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"477640d4-ef14-4534-8d47-56eca44538d0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:54:36Z" name: cluster-image-registry-operator-dockercfg-c9rqh namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 477640d4-ef14-4534-8d47-56eca44538d0 resourceVersion: "2778" uid: 95c07245-b2a4-4ad4-b609-65deaf0a1421 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T19:54:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:54:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e6b8a487-cf2f-4abe-8a27-0802cba16448"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:54:36Z" name: default-dockercfg-pzpss namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: e6b8a487-cf2f-4abe-8a27-0802cba16448 resourceVersion: "2779" uid: 1d1cb5f2-e74a-4125-b3d3-898b9dc33c06 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T19:54:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"185778fe-d3ef-45f6-bf1e-3bf5afbcf3f4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:54:41Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:54:42Z" name: deployer-dockercfg-8mfgp namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 185778fe-d3ef-45f6-bf1e-3bf5afbcf3f4 resourceVersion: "3585" uid: 18890eb2-3228-4fb6-a335-2e2eba48e2f0 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:9fe14228391175d98c3d4a35fd53fc438a229b213caf23c98267552589812f66 creationTimestamp: "2026-04-22T19:54:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T19:54:25Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1905" uid: 15e35a24-ccaf-4fbf-826f-57f48efdaa65 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T19:58:43Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 9f6c0140-2811-4916-9c6a-019e0ec3a7c2 service.beta.openshift.io/expiry: "2028-04-21T19:58:43Z" creationTimestamp: "2026-04-22T19:58:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"9f6c0140-2811-4916-9c6a-019e0ec3a7c2"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T19:58:44Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 9f6c0140-2811-4916-9c6a-019e0ec3a7c2 resourceVersion: "7341" uid: 40afb92a-cc59-4b21-8a7d-b3804ea67e7b type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-22T19:54:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T19:54:25Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1904" uid: af996f8d-b10f-4732-a41a-11cab33eb374 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-22T19:54:22Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-22T19:54:22Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1701" uid: 0866c15d-209b-4996-badb-32d3b5dbf8dd type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-22T19:54:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"71a68202-f140-4575-9690-5da3d7b3b3ac"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:54:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:54:37Z" name: node-ca-dockercfg-txvmq namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 71a68202-f140-4575-9690-5da3d7b3b3ac resourceVersion: "2790" uid: 2140c047-5d20-43d3-b7d5-fbfc29567359 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-22T19:54:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"10391475-670e-49aa-b514-3065682d6549"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:54:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:54:37Z" name: pruner-dockercfg-5n9bl namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 10391475-670e-49aa-b514-3065682d6549 resourceVersion: "2800" uid: 5bad043e-60ba-41ed-b855-a1ee894efb38 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-22T19:54:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"27876586-11f2-436f-9b77-27d4058a440d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:54:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:54:37Z" name: registry-dockercfg-wxhns namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 27876586-11f2-436f-9b77-27d4058a440d resourceVersion: "2801" uid: 5f0f4205-f1ad-40b0-9fcb-1d8bd8296878 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "37119"