--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T17:37:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"39de93ed-7725-469f-a880-f6fd3e0adbb6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:37:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:13:35Z" name: builder-dockercfg-t4jrp namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 39de93ed-7725-469f-a880-f6fd3e0adbb6 resourceVersion: "37868" uid: 752cbee9-3201-439c-a903-c9b47e0f0d8a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-16T17:37:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a0d96067-e409-4904-b026-09e9bd9a562e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:37:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:13:29Z" name: cluster-image-registry-operator-dockercfg-5lhxk namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: a0d96067-e409-4904-b026-09e9bd9a562e resourceVersion: "37667" uid: 2b4db192-923a-49e9-8b54-46a1ccdf7872 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T17:37:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c4beecb4-be8b-4d47-91d4-982dab16a4f7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:37:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:13:29Z" name: default-dockercfg-8wsqd namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: c4beecb4-be8b-4d47-91d4-982dab16a4f7 resourceVersion: "37651" uid: acfa60b5-07d0-4689-8423-7f24b04fc11d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T17:37:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"992f3437-ce7c-42d1-b15f-06ec6ef0d50e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:37:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:13:35Z" name: deployer-dockercfg-2r566 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 992f3437-ce7c-42d1-b15f-06ec6ef0d50e resourceVersion: "37865" uid: 88ac1b48-e50c-4d9d-80ab-2837fa152f53 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:76517cef4c38b93e61aa8624f86ddaed3a20bea849b94f548a336edbfb7402d6 creationTimestamp: "2026-04-16T17:36:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T17:36:42Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1817" uid: eed871db-3e9b-416c-9878-13b17e2b4541 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T17:40:49Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 3b2e1acc-9ad8-4512-8b9b-08329c2b4c9d service.beta.openshift.io/expiry: "2028-04-15T17:40:49Z" creationTimestamp: "2026-04-16T17:40:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"3b2e1acc-9ad8-4512-8b9b-08329c2b4c9d"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T17:40:49Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 3b2e1acc-9ad8-4512-8b9b-08329c2b4c9d resourceVersion: "6994" uid: 84e5e11d-0c3f-4b21-80f1-a2da1c0401f1 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-16T17:36:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T17:36:42Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1814" uid: 2ce6b90d-e68d-4b35-b930-03d20b350a34 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-16T17:36:40Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-16T17:36:40Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1667" uid: ba2f4837-3b61-4754-be73-577f5cb140ac type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-16T17:37:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d8f0ad23-ed8e-41e2-b8ca-505a63a5341b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:37:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:13:29Z" name: node-ca-dockercfg-q85p4 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: d8f0ad23-ed8e-41e2-b8ca-505a63a5341b resourceVersion: "37657" uid: 9fa6e6fb-a8c4-411b-9e5f-71646eb1b32d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-16T17:37:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5c8dc9cf-a8f5-4055-b578-8962d77e8bea"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:37:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:13:29Z" name: pruner-dockercfg-8wd7z namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 5c8dc9cf-a8f5-4055-b578-8962d77e8bea resourceVersion: "37656" uid: 844cc417-49e3-4777-8a9f-0853ac660e83 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-16T17:37:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"23283de2-0f3e-4012-843d-f0b11491f219"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:37:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:13:29Z" name: registry-dockercfg-n5znr namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 23283de2-0f3e-4012-843d-f0b11491f219 resourceVersion: "37649" uid: b8471fd3-bf14-436f-b1b3-43f3e37f8fbf type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "38774"