--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-23T13:28:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T13:28:43Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1d41eb99-6dd6-42a6-aba0-2324997f4eaf"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T13:28:43Z" name: builder-dockercfg-px2hc namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 1d41eb99-6dd6-42a6-aba0-2324997f4eaf resourceVersion: "4301" uid: 6a222a76-9e78-45ad-b23b-c4ddc0e2e399 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-23T13:28:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"65d29db5-62c3-462e-8471-1b74ea8ee8bf"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T13:28:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T13:28:38Z" name: cluster-image-registry-operator-dockercfg-bb7zl namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 65d29db5-62c3-462e-8471-1b74ea8ee8bf resourceVersion: "3718" uid: 4ab49abd-ee51-4a57-b17c-f25fe0aaf899 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-23T13:28:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7dac0c0d-d0f3-4f2c-b46c-681d3e48cab0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T13:28:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T13:28:38Z" name: default-dockercfg-ksn2f namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 7dac0c0d-d0f3-4f2c-b46c-681d3e48cab0 resourceVersion: "3719" uid: a1483f9d-cb11-42dc-94dd-b975df6b9b75 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-23T13:28:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T13:28:43Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6729dc09-6cda-4b47-9afe-7fdde4b1c83e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T13:28:43Z" name: deployer-dockercfg-zzflv namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 6729dc09-6cda-4b47-9afe-7fdde4b1c83e resourceVersion: "4304" uid: 71e21aa8-24cb-4127-b0b1-347c0b58e517 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:0cb3f209e7317e71321d818586cf5e76d7a1fe7062b302ca8c5ec748c00e6ccc creationTimestamp: "2026-04-23T13:27:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-23T13:27:53Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1906" uid: efc14b14-35b8-4561-9952-36bdd86f0af3 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-22T13:34:05Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 07e41060-e56d-4ae2-967b-c861ab0f669f service.beta.openshift.io/expiry: "2028-04-22T13:34:05Z" creationTimestamp: "2026-04-23T13:34:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"07e41060-e56d-4ae2-967b-c861ab0f669f"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-23T13:34:06Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 07e41060-e56d-4ae2-967b-c861ab0f669f resourceVersion: "7829" uid: b3f83229-7dab-4f48-991c-845d5ea45896 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-23T13:27:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-23T13:27:53Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1905" uid: b26afcaa-2c59-4da6-a505-dc97c0771649 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-23T13:27:50Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-23T13:27:50Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1672" uid: 32457afa-cf5a-43a5-b6d0-dbdc98eabe01 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-23T13:28:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"18b6ce4b-1a69-4420-a80c-cee8995cf433"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T13:28:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T13:28:38Z" name: node-ca-dockercfg-jcpkp namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 18b6ce4b-1a69-4420-a80c-cee8995cf433 resourceVersion: "3735" uid: d3559000-7204-4572-9900-af4f43a2dc52 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-23T13:28:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f3811501-b86c-4958-a9c0-3cb253a32f87"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T13:28:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T13:28:38Z" name: pruner-dockercfg-5rmqj namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: f3811501-b86c-4958-a9c0-3cb253a32f87 resourceVersion: "3736" uid: 65fa0adf-7953-4c2f-b140-e544acb65d45 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-23T13:28:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"26652faa-1d8e-4c29-9dcd-ce779899f5f0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T13:28:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T13:28:38Z" name: registry-dockercfg-nw8fz namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 26652faa-1d8e-4c29-9dcd-ce779899f5f0 resourceVersion: "3737" uid: ab936833-f92f-4d69-aa75-eaa5f9236f60 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21167"