--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T18:06:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"62a15b2a-082c-4e8b-ad8a-173101298491"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:06:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:42:35Z" name: builder-dockercfg-4czll namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 62a15b2a-082c-4e8b-ad8a-173101298491 resourceVersion: "25560" uid: 746f4027-f0f2-44ed-a0b1-1d078f5973d3 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-16T18:06:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b499e57c-fde5-4f0c-bb60-f65ddd7a0ab1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:06:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:42:30Z" name: cluster-image-registry-operator-dockercfg-p6mzx namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: b499e57c-fde5-4f0c-bb60-f65ddd7a0ab1 resourceVersion: "25397" uid: 258b4f66-3980-4344-89f0-6c8af900d5d9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T18:06:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f733e6e3-3973-4eb4-ac95-c26f2e84df03"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:06:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:42:30Z" name: default-dockercfg-nk5x9 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: f733e6e3-3973-4eb4-ac95-c26f2e84df03 resourceVersion: "25380" uid: 7642bc4e-2f5a-4348-9a33-9322bc2dc92d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T18:06:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"023183eb-bc25-4928-b9de-70af7cdb9a4d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:06:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:42:35Z" name: deployer-dockercfg-kkpln namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 023183eb-bc25-4928-b9de-70af7cdb9a4d resourceVersion: "25562" uid: c96b7a79-b77e-4615-b9ac-e614a25b4ad7 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:9470a38a1d3b02e528f718e01ebaa3b3b7f70a3c0d86c54af15ce11d07260015 creationTimestamp: "2026-04-16T18:05:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T18:05:51Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1992" uid: e22c1715-9e4a-4775-84bf-eb6ad1bbda15 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T18:11:52Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 5c390f63-571b-488e-9d92-c4130c573718 service.beta.openshift.io/expiry: "2028-04-15T18:11:52Z" creationTimestamp: "2026-04-16T18:11:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"5c390f63-571b-488e-9d92-c4130c573718"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T18:11:53Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 5c390f63-571b-488e-9d92-c4130c573718 resourceVersion: "7614" uid: cc274730-e282-453f-86dc-f6debdd0afc1 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-16T18:05:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T18:05:51Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1990" uid: 478a2f97-099b-47e4-bf21-672b25924014 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-16T18:05:47Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-16T18:05:47Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1724" uid: efbb0b58-1dec-44d3-a8e3-c24113c3a678 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-16T18:06:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e3ab7e68-e8e9-419e-9fc5-e9bf69ea7d6b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:06:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:42:30Z" name: node-ca-dockercfg-rppnt namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: e3ab7e68-e8e9-419e-9fc5-e9bf69ea7d6b resourceVersion: "25399" uid: 0fc0c1bf-25fb-46f5-ad28-00b1f1e07389 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-16T18:06:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ab858c23-b609-49ea-bdb0-cfda001be61c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:06:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:42:30Z" name: pruner-dockercfg-h2pkz namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: ab858c23-b609-49ea-bdb0-cfda001be61c resourceVersion: "25388" uid: feaf161f-c294-48cf-b914-3efce12f7850 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-16T18:06:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f52413a7-414e-49a7-a2ad-b59dcfcb083c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:06:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:42:30Z" name: registry-dockercfg-9692l namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: f52413a7-414e-49a7-a2ad-b59dcfcb083c resourceVersion: "25389" uid: 8710e188-82f2-4149-bfc9-fa5edba5a270 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "41584"