--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-23T01:06:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7bd399d2-6070-4ce0-9e18-a68d26ac70cc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T01:06:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T01:42:43Z" name: builder-dockercfg-94ffl namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 7bd399d2-6070-4ce0-9e18-a68d26ac70cc resourceVersion: "44756" uid: 44cd4c1e-8167-4f7e-9f1e-fb58803fc514 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-23T01:06:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"006f26a5-167a-4eaf-b6e7-ea3515260828"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T01:06:12Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T01:42:40Z" name: cluster-image-registry-operator-dockercfg-v9tg4 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 006f26a5-167a-4eaf-b6e7-ea3515260828 resourceVersion: "44499" uid: 2dab3573-23e7-4a43-8aec-4be53c521db4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-23T01:06:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4d30a24b-3dd5-4d83-9711-0f27ba64ecd0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T01:06:12Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T01:42:40Z" name: default-dockercfg-8vtvr namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 4d30a24b-3dd5-4d83-9711-0f27ba64ecd0 resourceVersion: "44457" uid: be573953-546e-47a4-82f0-89e90949d341 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-23T01:06:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"34e885c8-c76f-4741-bfbc-267fa5044423"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T01:06:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T01:42:42Z" name: deployer-dockercfg-qwhdr namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 34e885c8-c76f-4741-bfbc-267fa5044423 resourceVersion: "44652" uid: 0fedc110-9fba-4e52-b2b4-b2120371553e type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:6e6c73a362cfa660b630eb3b14aab11b9e19d643ee0551395cea6056ce69963a creationTimestamp: "2026-04-23T01:06:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-23T01:06:40Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "4028" uid: 2117b303-e77f-407c-ba9b-f985e515286e type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-22T01:12:04Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: b5ec339b-2cc1-4965-8914-6ae01f344891 service.beta.openshift.io/expiry: "2028-04-22T01:12:04Z" creationTimestamp: "2026-04-23T01:12:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"b5ec339b-2cc1-4965-8914-6ae01f344891"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-23T01:12:05Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: b5ec339b-2cc1-4965-8914-6ae01f344891 resourceVersion: "7710" uid: 0d379950-7f9b-44be-a8a8-f6c32320bf78 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-23T01:06:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-23T01:06:40Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "4026" uid: c1dbffe1-c627-40dc-8abe-450dedfa123d type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-23T01:05:46Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-23T01:05:46Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1650" uid: 30212513-3273-4ff0-92db-33dc4ac71db5 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-23T01:06:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a8c03060-b297-42d1-af62-a569ddf23061"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T01:06:12Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T01:42:40Z" name: node-ca-dockercfg-wfw99 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: a8c03060-b297-42d1-af62-a569ddf23061 resourceVersion: "44486" uid: 51e46234-9644-4fde-b70d-49d939f08328 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-23T01:06:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d23e934a-85bf-4e1d-bc80-26e249e36ffe"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T01:06:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T01:42:44Z" name: pruner-dockercfg-v5ftp namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: d23e934a-85bf-4e1d-bc80-26e249e36ffe resourceVersion: "44792" uid: 9351d2e9-dc6e-49db-b175-6ea196a639f5 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-23T01:06:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"082c7722-dc8d-40d5-9958-89c7c1ca981a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T01:06:40Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T01:42:44Z" name: registry-dockercfg-ndfmc namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 082c7722-dc8d-40d5-9958-89c7c1ca981a resourceVersion: "44794" uid: 27429274-c083-4a5a-9b94-af1e84fa8391 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "46378"