--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T16:49:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:49:13Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5e61ff36-7b46-4a83-9f3b-45d4aad032a1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:49:13Z" name: builder-dockercfg-sg7nc namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 5e61ff36-7b46-4a83-9f3b-45d4aad032a1 resourceVersion: "3432" uid: 06a7a015-f629-42f3-8142-1c5f1f7676c1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-17T16:49:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:49:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"709e13d5-596a-4cbc-8090-262f6bdc4fec"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:49:08Z" name: cluster-image-registry-operator-dockercfg-tmwfm namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 709e13d5-596a-4cbc-8090-262f6bdc4fec resourceVersion: "2787" uid: a9af7cd9-9057-4463-b43d-3ef65e8993af type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T16:49:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:49:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9771f6f3-f983-4715-8a37-5b917bae5c89"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:49:08Z" name: default-dockercfg-bqlzx namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 9771f6f3-f983-4715-8a37-5b917bae5c89 resourceVersion: "2791" uid: 81113ff2-6c42-4222-9dc5-e0dd423a5e36 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T16:49:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:49:13Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1b6d479b-639f-4b9e-8c85-3d4e1f33cb22"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:49:13Z" name: deployer-dockercfg-pcwq9 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 1b6d479b-639f-4b9e-8c85-3d4e1f33cb22 resourceVersion: "3436" uid: 93be2e5d-1d05-4675-8215-fa62680cf70c type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:34f74f85cb136aa14946f90f49184e6b8993324d2c6aba21ebf49c50324b6263 creationTimestamp: "2026-04-17T16:48:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T16:48:56Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1839" uid: 01631b58-f67c-4af9-9d3f-1a768d7bb7a0 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T16:53:35Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: e2d10dd5-30ca-427b-835a-4cd5981b0a58 service.beta.openshift.io/expiry: "2028-04-16T16:53:35Z" creationTimestamp: "2026-04-17T16:53:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"e2d10dd5-30ca-427b-835a-4cd5981b0a58"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T16:53:35Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: e2d10dd5-30ca-427b-835a-4cd5981b0a58 resourceVersion: "7406" uid: b019f627-117b-4a22-9232-6b8830d61e1a type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-17T16:48:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T16:48:56Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1836" uid: 67aef8b8-1fdc-42e5-a91e-554fe5ff6f2d type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-17T16:48:54Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-17T16:48:54Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1667" uid: 65da5539-fd05-4d3a-b752-93b10d90d276 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-17T16:49:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:49:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"67e9e4c3-8529-4a76-92ea-d973d891c555"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:49:08Z" name: node-ca-dockercfg-vj7nk namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 67e9e4c3-8529-4a76-92ea-d973d891c555 resourceVersion: "2794" uid: e3004400-600b-4152-ae54-f82552f17f5e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-17T16:49:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:49:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cec03245-e2e9-4b10-9566-1bbd35e7a602"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:49:08Z" name: pruner-dockercfg-4vf5g namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: cec03245-e2e9-4b10-9566-1bbd35e7a602 resourceVersion: "2801" uid: 14e17eaf-85f5-4506-9d82-f6eabcf5536b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-17T16:49:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:49:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0816781f-6b36-48a9-a413-1ff91c78f16b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:49:08Z" name: registry-dockercfg-97wlb namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 0816781f-6b36-48a9-a413-1ff91c78f16b resourceVersion: "2804" uid: 1af107dd-90ef-48e5-9129-fa66901fa0fb type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "27599"