--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T16:19:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d6b4e662-43d3-424b-8533-53e03ee8329c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T16:19:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T16:19:45Z" name: builder-dockercfg-vksdf namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: d6b4e662-43d3-424b-8533-53e03ee8329c resourceVersion: "3782" uid: 6f40b806-d4ec-472e-9cf2-05e0e0a5cb97 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-20T16:19:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T16:19:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"68611075-2d56-43ad-b168-526847f7d5b6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T16:19:39Z" name: cluster-image-registry-operator-dockercfg-pbdmf namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 68611075-2d56-43ad-b168-526847f7d5b6 resourceVersion: "3030" uid: 718e9cf4-deaa-492a-a603-fede2a130c65 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T16:19:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T16:19:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d9bda967-ffdb-44aa-ac79-504df6d76991"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T16:19:39Z" name: default-dockercfg-qzqcs namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: d9bda967-ffdb-44aa-ac79-504df6d76991 resourceVersion: "3033" uid: 7e3f10ce-fe37-4ed9-9c6e-24713a0adc46 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T16:19:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"66eb3cfb-6644-4982-a731-fdd5ed5e34c7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T16:19:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T16:19:45Z" name: deployer-dockercfg-xzvwf namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 66eb3cfb-6644-4982-a731-fdd5ed5e34c7 resourceVersion: "3765" uid: 49612228-7798-40ea-a7d3-e38e59dc492a type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:96ea325f638dc1fd9e70d69c5976281d3ed660c5f1e551f2d6792862bf928892 creationTimestamp: "2026-04-20T16:19:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-20T16:19:25Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1887" uid: f31bd78a-d594-47f1-8dbe-4b716626a2f6 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T16:25:46Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 2effb7be-5102-4d49-8974-caaff1096b23 service.beta.openshift.io/expiry: "2028-04-19T16:25:46Z" creationTimestamp: "2026-04-20T16:25:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"2effb7be-5102-4d49-8974-caaff1096b23"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T16:25:47Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 2effb7be-5102-4d49-8974-caaff1096b23 resourceVersion: "7859" uid: b3c4147a-afb4-4abe-88fc-d93613a189b9 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-20T16:19:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-20T16:19:25Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1886" uid: 9db504b0-fc4c-4eb3-af6c-c1d4ff8c2826 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-20T16:19:22Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-20T16:19:22Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1641" uid: 47252753-b83d-4f42-85d3-d24ef14bda57 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-20T16:19:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T16:19:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2042e284-c2f4-4b29-9547-062a3ec8cafe"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T16:19:39Z" name: node-ca-dockercfg-7czc8 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 2042e284-c2f4-4b29-9547-062a3ec8cafe resourceVersion: "3055" uid: d03b632d-cba1-4102-8ede-2ccd55832530 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-20T16:19:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e5b4c9ad-f1e9-41f2-88b7-cf687935a982"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T16:19:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T16:19:40Z" name: pruner-dockercfg-d9mwz namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: e5b4c9ad-f1e9-41f2-88b7-cf687935a982 resourceVersion: "3058" uid: 1dbd8ce6-3d7d-4494-9a97-be2cd21099e9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-20T16:19:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"30e1d8c3-858a-40f8-9f8b-497b01a0e76f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T16:19:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T16:19:40Z" name: registry-dockercfg-n225r namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 30e1d8c3-858a-40f8-9f8b-497b01a0e76f resourceVersion: "3061" uid: 8de25d82-ac7b-43dd-ac6b-b7727596e7fb type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "27985"