--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T18:33:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c5da6ea6-2ecc-4c51-b27e-79f2d20419b0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:33:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:45:16Z" name: builder-dockercfg-gmdzk namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: c5da6ea6-2ecc-4c51-b27e-79f2d20419b0 resourceVersion: "38602" uid: a2343768-3d06-40dd-b132-b09e34151ecb type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE4OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-22T18:33:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"57822a8e-69df-43c5-8579-677514598ece"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:33:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:45:11Z" name: cluster-image-registry-operator-dockercfg-7cv9l namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 57822a8e-69df-43c5-8579-677514598ece resourceVersion: "38459" uid: e2689bdf-a39d-429c-8e3d-38765f8afcfa type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T18:33:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1f7caaab-43da-44c9-912a-0c6907c812b0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:33:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:45:11Z" name: default-dockercfg-k62wt namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 1f7caaab-43da-44c9-912a-0c6907c812b0 resourceVersion: "38444" uid: 581ec624-1521-4c3a-b285-0191a9e70db3 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T18:33:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5500558b-a3ae-4ca3-b4f4-6205b733a56d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:33:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:45:16Z" name: deployer-dockercfg-fj7gf namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 5500558b-a3ae-4ca3-b4f4-6205b733a56d resourceVersion: "38605" uid: 98310c4d-ffc0-42d4-8688-3c863ef6182d type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:43d64ed59a41bfb82bbbb3d3b22d9beab85ce1516b726e1cdc7ff54b12760ea9 creationTimestamp: "2026-04-22T18:33:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T18:33:00Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "2076" uid: 453d15fd-c1f3-487f-b13d-589816100264 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T18:37:06Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 9c0057e6-737b-415c-b89a-7da7447b473e service.beta.openshift.io/expiry: "2028-04-21T18:37:06Z" creationTimestamp: "2026-04-22T18:37:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"9c0057e6-737b-415c-b89a-7da7447b473e"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T18:37:07Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 9c0057e6-737b-415c-b89a-7da7447b473e resourceVersion: "7090" uid: 657beda6-fcf5-45bb-86ab-dc6c50d08f0d type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-22T18:33:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T18:33:00Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "2071" uid: e24368d7-ab54-45a5-833b-16605400c9a7 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-22T18:32:55Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-22T18:32:55Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1762" uid: 74d2f759-83c2-48b4-8b74-f76d94c67a0a type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-22T18:33:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5dea38d4-2097-4260-bc42-db2549bee800"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:33:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:45:11Z" name: node-ca-dockercfg-m6fn9 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 5dea38d4-2097-4260-bc42-db2549bee800 resourceVersion: "38440" uid: ad5bdc48-7edf-4c2d-a137-072c428c3cbc type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-22T18:33:11Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8fbd1805-f17a-4777-a83d-3cc461138335"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:33:11Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:45:11Z" name: pruner-dockercfg-trk2j namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 8fbd1805-f17a-4777-a83d-3cc461138335 resourceVersion: "38447" uid: b6d91eec-cd9e-416c-bec5-6022ba0acd5d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-22T18:33:11Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4e535a29-6a66-46ba-8408-1716183237d9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:33:11Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:45:11Z" name: registry-dockercfg-8gvfs namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 4e535a29-6a66-46ba-8408-1716183237d9 resourceVersion: "38446" uid: 86409a43-67bd-45eb-ad77-b134153090b1 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "48297"