--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-23T17:37:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cf82b5a2-0c12-4a75-a320-82eacb5a4878"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:37:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T18:13:38Z" name: builder-dockercfg-pclmm namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: cf82b5a2-0c12-4a75-a320-82eacb5a4878 resourceVersion: "21923" uid: 8cfcdbec-e121-49ee-be59-1b33a56c3f41 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-23T17:37:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"67e505e4-4773-408d-81a8-01a0c29d3b14"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:37:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T18:13:33Z" name: cluster-image-registry-operator-dockercfg-c8xfw namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 67e505e4-4773-408d-81a8-01a0c29d3b14 resourceVersion: "21747" uid: 29dcf2d9-b750-46cc-a89e-74c16303acbf type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-23T17:37:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cef1f871-0f63-4fad-b5e2-6d01cc0bf267"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:37:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T18:13:33Z" name: default-dockercfg-7vvl2 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: cef1f871-0f63-4fad-b5e2-6d01cc0bf267 resourceVersion: "21768" uid: ae879503-72a6-4fe7-ae81-4c9351616c7a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-23T17:37:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ec073bcf-e256-4b95-98c8-c17dd1fea73c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:37:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T18:13:38Z" name: deployer-dockercfg-nv2pf namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: ec073bcf-e256-4b95-98c8-c17dd1fea73c resourceVersion: "21929" uid: daae60e6-7545-41b3-ad7d-c0660f727d4f type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:bcfd864ffbc23fef00aa20399c9acb6aa2983da382875b8509a0a96a33a3455c creationTimestamp: "2026-04-23T17:37:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-23T17:37:16Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1773" uid: ff5ed79d-034c-4077-ad06-ab944990bb9d type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-22T17:43:23Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 92d814c8-3d1d-4a02-90b3-8ba95829a0b0 service.beta.openshift.io/expiry: "2028-04-22T17:43:23Z" creationTimestamp: "2026-04-23T17:43:24Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"92d814c8-3d1d-4a02-90b3-8ba95829a0b0"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-23T17:43:24Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 92d814c8-3d1d-4a02-90b3-8ba95829a0b0 resourceVersion: "7671" uid: f1d5d5a4-8708-4f31-8329-49c1803d60c1 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-23T17:37:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-23T17:37:16Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1772" uid: b27b344f-8060-4244-a0a8-198b363f8500 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-23T17:37:14Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-23T17:37:14Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1684" uid: 7158ba3f-9b2c-4f57-a8e5-7791c33d88db type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-23T17:37:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d6930a1d-cddd-473b-bbd1-6db6a6336204"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:37:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T18:13:33Z" name: node-ca-dockercfg-8n4q4 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: d6930a1d-cddd-473b-bbd1-6db6a6336204 resourceVersion: "21757" uid: c66822e2-b302-458f-a8ea-f06115259876 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-23T17:37:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9ede5299-2415-4b98-b266-fa1f21ea3f22"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:37:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T18:13:33Z" name: pruner-dockercfg-2rwqf namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 9ede5299-2415-4b98-b266-fa1f21ea3f22 resourceVersion: "21754" uid: 1cea99db-8574-4089-8d51-cc72d62fa7f1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-23T17:37:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"31883c96-90ae-4690-b605-f4884a341aa4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:37:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T18:13:33Z" name: registry-dockercfg-7hx6w namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 31883c96-90ae-4690-b605-f4884a341aa4 resourceVersion: "21766" uid: 48c71ff7-9639-4d17-b287-43a9bbce3c61 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "25774"