--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T14:13:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"57d14160-73ff-4e07-8fea-d277f82d400e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:13:12Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:49:13Z" name: builder-dockercfg-x8wp9 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 57d14160-73ff-4e07-8fea-d277f82d400e resourceVersion: "26196" uid: 3f361fce-637e-4f54-8db9-54dd4e71d345 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-22T14:13:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"38363d10-0d8a-4405-8cf8-cbfc6b57e4ff"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:13:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:49:07Z" name: cluster-image-registry-operator-dockercfg-4thc2 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 38363d10-0d8a-4405-8cf8-cbfc6b57e4ff resourceVersion: "26006" uid: 3240bf69-c4f2-4c3d-975a-de716c92ec25 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T14:13:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"82516d23-4154-4ed8-a090-a7b8b8675b6e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:13:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:49:07Z" name: default-dockercfg-r2bdc namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 82516d23-4154-4ed8-a090-a7b8b8675b6e resourceVersion: "26004" uid: 2e2516f9-feac-411b-a708-55fffa27562b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T14:13:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6caedf96-db2b-4121-bea5-ab53effbfe81"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:13:12Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:49:13Z" name: deployer-dockercfg-cllsw namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 6caedf96-db2b-4121-bea5-ab53effbfe81 resourceVersion: "26195" uid: 0086fc78-81f1-4437-847e-431b748b688b type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:810d0552e077a55380cf3e9e495786ebcab241f0be67766502117618f925992c creationTimestamp: "2026-04-22T14:12:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T14:12:38Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "2028" uid: 650f2bee-1e7a-414e-a704-83d9e93c7012 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T14:16:37Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 6a260447-00af-43d4-8174-189a94eaac27 service.beta.openshift.io/expiry: "2028-04-21T14:16:37Z" creationTimestamp: "2026-04-22T14:16:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"6a260447-00af-43d4-8174-189a94eaac27"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T14:16:37Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 6a260447-00af-43d4-8174-189a94eaac27 resourceVersion: "7243" uid: 7c9e159c-ba34-4636-8ead-5ded52b8a86e type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-22T14:12:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T14:12:38Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "2027" uid: 1287c6aa-bec6-4a1c-a328-72a1bede0f11 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-22T14:12:35Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-22T14:12:35Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1667" uid: 8d298acb-63f7-4569-8b9c-b122adc3342c type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-22T14:13:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0d4bf427-7063-4b1c-9118-7b891d728942"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:13:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:49:07Z" name: node-ca-dockercfg-2dvwk namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 0d4bf427-7063-4b1c-9118-7b891d728942 resourceVersion: "26002" uid: 8eca9ebc-0170-47df-935d-3faa09a69c99 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-22T14:13:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1495bd6c-f3a6-4891-b2f7-b7a0ba521c1a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:13:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:49:07Z" name: pruner-dockercfg-wlxj4 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 1495bd6c-f3a6-4891-b2f7-b7a0ba521c1a resourceVersion: "26007" uid: a7e526ce-5fe1-413a-b692-570dded018fb type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-22T14:13:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e4d71217-8f83-4eb4-8401-5cd5aa9de30b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:13:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:49:07Z" name: registry-dockercfg-fd7vw namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: e4d71217-8f83-4eb4-8401-5cd5aa9de30b resourceVersion: "26000" uid: 8b0ec16c-fdfd-4fd3-b36e-4da79e378436 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "33093"