--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T13:08:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cf803359-345c-44b2-9b51-1ff718d6be10"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:08:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:44:07Z" name: builder-dockercfg-zrv9s namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: cf803359-345c-44b2-9b51-1ff718d6be10 resourceVersion: "44196" uid: 5e59a112-75de-4afe-897d-a276a8d90ca8 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-16T13:08:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9f77d980-bae9-4960-9c8a-9978b0115e33"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:08:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:44:02Z" name: cluster-image-registry-operator-dockercfg-445xw namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 9f77d980-bae9-4960-9c8a-9978b0115e33 resourceVersion: "44006" uid: 03ac899b-3ef6-45b2-bdb0-7501f97b8b69 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T13:08:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"53918b94-5d0a-468d-a582-9dc75c384021"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:08:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:44:02Z" name: default-dockercfg-6pz87 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 53918b94-5d0a-468d-a582-9dc75c384021 resourceVersion: "44012" uid: a3055db9-5c87-4d6d-bb05-a5a5c082f566 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T13:08:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f9b04d4d-4702-4829-82bc-868f88aa5b74"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:08:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:44:07Z" name: deployer-dockercfg-vlw5r namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: f9b04d4d-4702-4829-82bc-868f88aa5b74 resourceVersion: "44203" uid: 41a72af1-6a46-40b9-be6b-4ad04142f2f6 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:38c454b4c86f5bacc35a95f7666977ace911ff9648ee313758c613b5be1ee2e3 creationTimestamp: "2026-04-16T13:07:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T13:07:43Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1992" uid: 49314adc-9fd3-46bc-acd7-891743fcdb56 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T13:14:00Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 763f2ab2-8038-43e3-847a-eb32390d7de0 service.beta.openshift.io/expiry: "2028-04-15T13:14:00Z" creationTimestamp: "2026-04-16T13:14:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"763f2ab2-8038-43e3-847a-eb32390d7de0"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T13:14:01Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 763f2ab2-8038-43e3-847a-eb32390d7de0 resourceVersion: "7844" uid: ef7e587a-0078-4db0-ad1c-c833d1b29a97 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-16T13:07:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T13:07:43Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1988" uid: 56e22bf5-ec82-4deb-80f9-97af05758450 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-16T13:07:40Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-16T13:07:40Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1663" uid: ef429a87-1c8e-462e-b288-f006aac5216e type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-16T13:08:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"62c3f207-b5d9-4fe0-ae9f-3a6528db7103"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:08:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:44:02Z" name: node-ca-dockercfg-xq9cv namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 62c3f207-b5d9-4fe0-ae9f-3a6528db7103 resourceVersion: "44022" uid: f76a9835-9cf7-4403-b3d7-6ef4abe28bf3 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-16T13:08:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"06e3a22e-3294-4ed0-934a-5abe492a48ba"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:08:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:44:02Z" name: pruner-dockercfg-ppqjb namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 06e3a22e-3294-4ed0-934a-5abe492a48ba resourceVersion: "44000" uid: b5d1ca25-f522-449c-95d5-fa54f2b80da5 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-16T13:08:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"44a28055-6416-4793-bca7-94b4d5a512ef"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:08:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:44:02Z" name: registry-dockercfg-sxsq4 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 44a28055-6416-4793-bca7-94b4d5a512ef resourceVersion: "44014" uid: 3a72323c-60a1-4db8-9f4d-96fa140a08c1 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "44734"