--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T14:20:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"71834111-82d7-470e-bec8-f2315bff951b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:23Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:58Z" name: builder-dockercfg-jbkhb namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 71834111-82d7-470e-bec8-f2315bff951b resourceVersion: "26197" uid: c9764ff7-faa4-48a9-8367-d19dcf1c9caa type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-24T14:20:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"639261b8-b2c4-4f73-8fd1-9e297c7ec4f3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:56Z" name: cluster-image-registry-operator-dockercfg-fmnrq namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 639261b8-b2c4-4f73-8fd1-9e297c7ec4f3 resourceVersion: "26026" uid: 461470f9-d8f3-417c-9709-b15df8fc04b8 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T14:20:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b6d4dc17-8b4b-429a-bc1b-c0fd9fe88dcc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:56Z" name: default-dockercfg-nbhcf namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: b6d4dc17-8b4b-429a-bc1b-c0fd9fe88dcc resourceVersion: "26097" uid: 9d38113f-3183-460a-a49d-58a96f1f0ae8 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T14:20:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f6f5eb5e-d057-444e-bdfa-8dab7cd25c6d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:23Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:58Z" name: deployer-dockercfg-h5jr4 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: f6f5eb5e-d057-444e-bdfa-8dab7cd25c6d resourceVersion: "26210" uid: 7094ce5d-0001-4635-a29f-1ce868c7e69e type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:d45e48b2872d2081ffe75bf113817638da6efa619a0353b784f6af62c541684c creationTimestamp: "2026-04-24T14:20:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-24T14:20:55Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "4096" uid: 9927d10f-5ca1-44c8-b8f3-d0dfdfa06c4f type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T14:26:01Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 69b3a90e-ee71-4201-b2a2-3ae39b770aaa service.beta.openshift.io/expiry: "2028-04-23T14:26:01Z" creationTimestamp: "2026-04-24T14:26:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"69b3a90e-ee71-4201-b2a2-3ae39b770aaa"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T14:26:02Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 69b3a90e-ee71-4201-b2a2-3ae39b770aaa resourceVersion: "7629" uid: b70a292f-b751-458f-b701-333626cffcd6 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-24T14:20:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-24T14:20:55Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "4094" uid: f735ad54-f070-42cc-a323-e8ddf02055f4 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-24T14:19:59Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-24T14:19:59Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1673" uid: 0729bdb7-c7a6-4860-a5f9-bc8877be5966 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-24T14:20:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"93551ea5-681d-4b20-adc5-58c0af09b111"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:56Z" name: node-ca-dockercfg-szvkl namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 93551ea5-681d-4b20-adc5-58c0af09b111 resourceVersion: "25974" uid: 6c004594-ef2c-4eec-bda7-af21b3354608 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-24T14:20:54Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"839c954a-d324-4ef4-ab91-2c4a25a11614"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:54Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:59Z" name: pruner-dockercfg-vkm84 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 839c954a-d324-4ef4-ab91-2c4a25a11614 resourceVersion: "26286" uid: e9d2889f-60bb-40a6-81f0-f4e8e5c765de type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-24T14:20:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7bb5bf07-7efb-4457-9c1c-eb692e34dcc7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:55Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:59Z" name: registry-dockercfg-xtmb2 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 7bb5bf07-7efb-4457-9c1c-eb692e34dcc7 resourceVersion: "26255" uid: dece0eec-7875-46be-a399-ff7b184cb632 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "33179"