--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T16:27:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d993bca7-aeae-4b0a-80be-18859abffd34"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:27:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:03:46Z" name: builder-dockercfg-9wxck namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: d993bca7-aeae-4b0a-80be-18859abffd34 resourceVersion: "25622" uid: 7e30b1ec-3ccb-412f-9e2e-1a9aec472a63 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-17T16:27:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"49945269-4575-4799-802d-604f9a4a65fa"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:27:41Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:03:41Z" name: cluster-image-registry-operator-dockercfg-4hq6q namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 49945269-4575-4799-802d-604f9a4a65fa resourceVersion: "25299" uid: 5d47f26f-3a25-4226-9c0d-25f7ad0b7422 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T16:27:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5980c850-d76f-4367-bc24-5532998619f6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:27:41Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:03:41Z" name: default-dockercfg-77nbz namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 5980c850-d76f-4367-bc24-5532998619f6 resourceVersion: "25287" uid: 1dc04ebc-a6a9-430f-9bfa-86e5fa769977 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T16:27:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5943396e-370f-45e1-a179-5c1ff9a6537d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:27:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:03:46Z" name: deployer-dockercfg-hlcpq namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 5943396e-370f-45e1-a179-5c1ff9a6537d resourceVersion: "25606" uid: 337bf8c1-5835-440a-85f5-fa72f04596bb type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:74f0071a7279344a88d6f71c99f34829ed089559bbdc2346ba1d8774ac5fe920 creationTimestamp: "2026-04-17T16:27:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T16:27:07Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1920" uid: 0c8aedb3-56f0-471d-8322-cdeec913094d type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T16:33:35Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: d2bc2c7b-ee31-4c84-979a-08a7208a3b69 service.beta.openshift.io/expiry: "2028-04-16T16:33:35Z" creationTimestamp: "2026-04-17T16:33:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"d2bc2c7b-ee31-4c84-979a-08a7208a3b69"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T16:33:36Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: d2bc2c7b-ee31-4c84-979a-08a7208a3b69 resourceVersion: "7609" uid: f1af6544-f9b7-4112-a3ec-78a7ce7b8f38 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-17T16:27:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T16:27:07Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1919" uid: 5512fdd6-d596-4c66-a711-3e7aae507252 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-17T16:27:04Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-17T16:27:04Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1805" uid: e3a94747-0875-4215-8bd0-ea3732db865f type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-17T16:27:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2f3b1b01-47a4-45c5-a9eb-c9ad4648aba5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:27:41Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:03:41Z" name: node-ca-dockercfg-fldzd namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 2f3b1b01-47a4-45c5-a9eb-c9ad4648aba5 resourceVersion: "25313" uid: d2612e2a-286c-4f51-8579-e1ed4e39b971 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-17T16:27:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"530982cb-b352-4c3f-a930-7b81f4584d8e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:27:41Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:03:41Z" name: pruner-dockercfg-t2rnq namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 530982cb-b352-4c3f-a930-7b81f4584d8e resourceVersion: "25284" uid: a00fa8a2-fe27-4dd4-a586-78ec608e6a81 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-17T16:27:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"12617741-e447-4141-9fcb-190d810a73fe"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:27:41Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:03:41Z" name: registry-dockercfg-zn7wr namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 12617741-e447-4141-9fcb-190d810a73fe resourceVersion: "25316" uid: 81d8c5a0-614b-4bb1-a3aa-237f63ba1f3d type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "33910"