--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T20:47:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"47b7b97e-7d3d-486d-bc08-4f3e071472de"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:47:16Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:47:47Z" name: builder-dockercfg-k7zbt namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 47b7b97e-7d3d-486d-bc08-4f3e071472de resourceVersion: "4272" uid: b2a2e42c-61b8-4984-9665-9d5c00dd60fb type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-17T20:47:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3198b2f5-fd7c-42c4-9f99-81de16eb386f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:47:12Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:47:45Z" name: cluster-image-registry-operator-dockercfg-pgfs6 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 3198b2f5-fd7c-42c4-9f99-81de16eb386f resourceVersion: "4099" uid: b1484026-107d-4535-8301-240f9898dcd8 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T20:47:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1b222714-a65f-46d0-b4b6-860217c61057"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:47:12Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:47:45Z" name: default-dockercfg-wvqwp namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 1b222714-a65f-46d0-b4b6-860217c61057 resourceVersion: "4100" uid: a84a6886-2a36-4750-a462-7ec51f6090f1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T20:47:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"298db057-a26c-4b4c-af65-e78d58c141e8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:47:16Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:47:47Z" name: deployer-dockercfg-7m4pr namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 298db057-a26c-4b4c-af65-e78d58c141e8 resourceVersion: "4274" uid: eb19302f-0e37-4138-b606-9bbe9ce81969 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:60e1f4b554333c5dd4051b30e5bc5462d8e4f3e434e1c0e99fcf930abb2557ce creationTimestamp: "2026-04-17T20:47:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T20:47:44Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "3995" uid: a9a433f5-7da4-4510-935a-47de32c7ecec type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T20:52:58Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 724d1338-9217-493d-98b9-816cb077f2e2 service.beta.openshift.io/expiry: "2028-04-16T20:52:58Z" creationTimestamp: "2026-04-17T20:52:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"724d1338-9217-493d-98b9-816cb077f2e2"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T20:52:58Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 724d1338-9217-493d-98b9-816cb077f2e2 resourceVersion: "7682" uid: 65ad155d-5941-4f9c-bccb-605e8ad09526 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-17T20:47:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T20:47:44Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "3993" uid: 63ec5f20-898c-448b-b998-5d9f6dcc9680 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-17T20:46:55Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-17T20:46:55Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1657" uid: 952816d8-35a1-4095-b15c-bae57c062ea0 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-17T20:47:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1dc852dd-4867-4cd5-b25b-ba9e740b8158"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:47:12Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:47:45Z" name: node-ca-dockercfg-scxbk namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 1dc852dd-4867-4cd5-b25b-ba9e740b8158 resourceVersion: "4101" uid: be705dd6-7e4c-4ddb-9624-2ddfe9033245 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-17T20:47:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1becb2fc-660d-450f-8b9e-9a5a02771ca5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:47:43Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:47:48Z" name: pruner-dockercfg-ch258 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 1becb2fc-660d-450f-8b9e-9a5a02771ca5 resourceVersion: "4346" uid: b3bd1ac2-d3e5-4194-9379-7a5ed53d341e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-17T20:47:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"59fa67bf-d18c-4fa3-b5b9-3740b87cdd48"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:47:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:47:48Z" name: registry-dockercfg-j6pkz namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 59fa67bf-d18c-4fa3-b5b9-3740b87cdd48 resourceVersion: "4347" uid: 2ac4135f-0ca5-43d4-9222-8eb74d1e1dad type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "26293"