--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T21:10:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"91960837-287a-43e7-8bff-c86a1c4bf79e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T21:10:25Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T21:10:26Z" name: builder-dockercfg-2wd6z namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 91960837-287a-43e7-8bff-c86a1c4bf79e resourceVersion: "4102" uid: b6830f67-673c-435f-9c2d-cc28ede170b3 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-17T21:10:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T21:10:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f925a3b5-48c7-463a-87d9-62b2b72264b6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T21:10:20Z" name: cluster-image-registry-operator-dockercfg-v57wg namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: f925a3b5-48c7-463a-87d9-62b2b72264b6 resourceVersion: "3529" uid: ea52cf29-0e39-42c8-801f-04895a4ddf8f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T21:10:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T21:10:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a7774e7c-e8a1-434f-95e7-ab42484a880e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T21:10:20Z" name: default-dockercfg-5njmj namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: a7774e7c-e8a1-434f-95e7-ab42484a880e resourceVersion: "3530" uid: bab08e11-b881-421a-8a41-6ee652cd472e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T21:10:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c0d117ee-e9ab-4cf0-b893-9e9ceeac8b9c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T21:10:25Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T21:10:26Z" name: deployer-dockercfg-lf2rx namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: c0d117ee-e9ab-4cf0-b893-9e9ceeac8b9c resourceVersion: "4113" uid: e5353631-5424-4a72-b112-a4d756323df1 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a946ec09316129e5c78e868bb04e9420464c51e3d3947156eae74cc7bc8405f7 creationTimestamp: "2026-04-17T21:09:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T21:09:47Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "2044" uid: 742c1fe0-ba18-4aed-8652-b13da6cf8e51 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T21:15:51Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: ac310f68-1b5b-4ed0-b2ca-372d6f39cbbe service.beta.openshift.io/expiry: "2028-04-16T21:15:51Z" creationTimestamp: "2026-04-17T21:15:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"ac310f68-1b5b-4ed0-b2ca-372d6f39cbbe"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T21:15:51Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: ac310f68-1b5b-4ed0-b2ca-372d6f39cbbe resourceVersion: "7696" uid: ceccf2a3-e99f-43f3-a93c-e38335908b9a type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-17T21:09:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T21:09:47Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "2042" uid: 9897551d-e586-4ca4-bb54-7b193cbf594b type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-17T21:09:41Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-17T21:09:41Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1630" uid: 928af454-3e72-4ee7-be0e-c902529cb8db type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-17T21:10:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T21:10:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ed549796-15a1-434c-a2fc-887650edb194"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T21:10:20Z" name: node-ca-dockercfg-5qs5g namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: ed549796-15a1-434c-a2fc-887650edb194 resourceVersion: "3534" uid: ee6ce04c-a4fa-4a5f-b333-36a31f28a9f4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-17T21:10:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T21:10:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7d745d4f-5acc-4f2e-9268-d6ce460120f7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T21:10:20Z" name: pruner-dockercfg-hj4ph namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 7d745d4f-5acc-4f2e-9268-d6ce460120f7 resourceVersion: "3538" uid: ad6f9603-cc10-4c12-a96e-5f1711c8664b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-17T21:10:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T21:10:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"aacab8fa-8175-43a3-9655-232e7b8fc9eb"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T21:10:20Z" name: registry-dockercfg-wxtwb namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: aacab8fa-8175-43a3-9655-232e7b8fc9eb resourceVersion: "3539" uid: 2989ecc0-4473-4899-aebb-40d904abed7f type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "27696"