--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T18:33:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"399a0696-b652-44a6-9a0a-840caaaf2863"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:33:21Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:09:21Z" name: builder-dockercfg-c69jp namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 399a0696-b652-44a6-9a0a-840caaaf2863 resourceVersion: "38960" uid: 9d20132e-c528-40b6-a47e-c891bd55242d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE4OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-22T18:33:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b629c487-1678-42b1-9316-2767a38a8ace"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:33:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:09:16Z" name: cluster-image-registry-operator-dockercfg-xzrq2 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: b629c487-1678-42b1-9316-2767a38a8ace resourceVersion: "38758" uid: 63b6d3a5-0231-4d4f-aaea-390bcb9d3c9a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T18:33:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6375f52d-637b-4db3-9745-e9c229fa7e67"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:33:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:09:16Z" name: default-dockercfg-fkptl namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 6375f52d-637b-4db3-9745-e9c229fa7e67 resourceVersion: "38755" uid: a8cd0a65-9cb3-481f-801b-3da6e2d11c42 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T18:33:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"23cb9a5d-242b-454d-96f7-5a0ef154d4cf"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:33:21Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:09:21Z" name: deployer-dockercfg-x446m namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 23cb9a5d-242b-454d-96f7-5a0ef154d4cf resourceVersion: "38940" uid: cd64073e-ebec-4203-aa4c-d5280b36cb81 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:7aef4f5414dfb36f88ac21816044c413f66706132ff58d68c02a640ac2a5eca7 creationTimestamp: "2026-04-22T18:32:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T18:32:57Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1840" uid: 69e16884-c9bc-481c-9bf1-1fadc2a084a5 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T18:39:01Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 0cd056fa-b773-44a8-96a5-e82f060239d5 service.beta.openshift.io/expiry: "2028-04-21T18:39:01Z" creationTimestamp: "2026-04-22T18:39:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"0cd056fa-b773-44a8-96a5-e82f060239d5"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T18:39:02Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 0cd056fa-b773-44a8-96a5-e82f060239d5 resourceVersion: "7365" uid: 073e4242-3e7f-41de-a91c-551c352347c2 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-22T18:32:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T18:32:57Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1836" uid: daf2286f-8095-4a7e-bc2a-3fd371c8f496 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-22T18:32:55Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-22T18:32:55Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1621" uid: 7739646f-4cc1-4471-a1d8-97ee5152ae58 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-22T18:33:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c5abfec8-a1f5-4da2-87c9-e32b34b5d32e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:33:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:09:16Z" name: node-ca-dockercfg-pjkgq namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: c5abfec8-a1f5-4da2-87c9-e32b34b5d32e resourceVersion: "38766" uid: fbac3e8a-7441-48fc-8236-abf378d3d2e6 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-22T18:33:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e8084b36-2058-40fd-a065-69ad4c785e21"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:33:16Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:09:16Z" name: pruner-dockercfg-htrcp namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: e8084b36-2058-40fd-a065-69ad4c785e21 resourceVersion: "38776" uid: 134446ed-42e6-416e-b80f-5ffd5e3e04f8 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-22T18:33:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a1b1924b-269a-4441-8ec1-de297d2aa8f7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:33:16Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:09:16Z" name: registry-dockercfg-fbmmk namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: a1b1924b-269a-4441-8ec1-de297d2aa8f7 resourceVersion: "38775" uid: b9deab4a-90a5-4bb2-810e-3cd06bb304da type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "39425"