--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T14:11:11Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0767087f-b20d-48b0-b523-76c22653fa7a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:11:11Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:11:48Z" name: builder-dockercfg-nmhn8 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 0767087f-b20d-48b0-b523-76c22653fa7a resourceVersion: "4148" uid: 1c8969a3-854b-4c38-856e-5ba308613f0c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-22T14:11:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ef91955e-821d-4508-bc18-c162b59c9014"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:11:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:11:47Z" name: cluster-image-registry-operator-dockercfg-dddzg namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: ef91955e-821d-4508-bc18-c162b59c9014 resourceVersion: "4024" uid: abaff75b-950b-4deb-ad69-b84ba593584e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T14:11:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"312bd2bb-d08b-4f8e-b76f-c135324032c1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:11:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:11:47Z" name: default-dockercfg-9sl6g namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 312bd2bb-d08b-4f8e-b76f-c135324032c1 resourceVersion: "4027" uid: 6dd4b3ef-9067-4a9e-876c-3076ba402f2a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T14:11:11Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1c7496ca-2a4e-46c7-a186-84e656ee56dc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:11:11Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:11:48Z" name: deployer-dockercfg-z8zdj namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 1c7496ca-2a4e-46c7-a186-84e656ee56dc resourceVersion: "4143" uid: 149a70ea-3d7b-40a0-9fe1-7a0a95b69913 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:d742a150c7527e66650d3a4ea74fcbffe26d2e051840d331c742dbc4312e7052 creationTimestamp: "2026-04-22T14:11:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T14:11:46Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "3918" uid: 020a2087-0de7-4757-9a7c-f0b8e1176143 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T14:17:30Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: d85b873d-bfe8-4d49-8d14-c37347fb2325 service.beta.openshift.io/expiry: "2028-04-21T14:17:30Z" creationTimestamp: "2026-04-22T14:17:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"d85b873d-bfe8-4d49-8d14-c37347fb2325"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T14:17:31Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: d85b873d-bfe8-4d49-8d14-c37347fb2325 resourceVersion: "7911" uid: 2382ea05-a2a5-4efd-ba3b-e9ba23f92c92 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-22T14:11:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T14:11:46Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "3917" uid: 642ee1bc-affe-4aca-80dd-e9857a337d5b type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-22T14:10:49Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-22T14:10:49Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1615" uid: 03b5cfd6-2616-4114-aec8-566e6c381f44 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-22T14:11:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f4d0dda6-5144-42d0-820b-2aba3fbd03ff"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:11:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:11:47Z" name: node-ca-dockercfg-ppfc2 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: f4d0dda6-5144-42d0-820b-2aba3fbd03ff resourceVersion: "4028" uid: dbbcfd60-b439-47c3-ae0c-43493ff68cbf type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-22T14:11:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a97bec70-4d69-47ec-8b3c-0b46cee3cb59"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:11:45Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:11:50Z" name: pruner-dockercfg-ms57k namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: a97bec70-4d69-47ec-8b3c-0b46cee3cb59 resourceVersion: "4340" uid: 576c8632-48af-489c-afd5-e91c94ccb509 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-22T14:11:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"de32e62c-7622-490d-b673-69c623079194"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:11:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:11:50Z" name: registry-dockercfg-bgh6b namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: de32e62c-7622-490d-b673-69c623079194 resourceVersion: "4343" uid: 324ae3ee-83f3-4640-9072-0da2516c39d6 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "38804"