--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T17:22:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f1618a99-0e60-4adf-af42-0b39bf3fd032"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:22:53Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:59:26Z" name: builder-dockercfg-xlf5v namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: f1618a99-0e60-4adf-af42-0b39bf3fd032 resourceVersion: "43341" uid: 45159230-ddf0-42f4-94a6-140562d720f0 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-17T17:22:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2ee604fd-c471-472e-8401-9430f38281f6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:22:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:59:24Z" name: cluster-image-registry-operator-dockercfg-pflw7 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 2ee604fd-c471-472e-8401-9430f38281f6 resourceVersion: "43077" uid: 7952f4db-f337-46b6-b0c1-4d87bef633a4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T17:22:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2cceff78-53a1-422f-828e-72501193cd1c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:22:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:59:24Z" name: default-dockercfg-grfqp namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 2cceff78-53a1-422f-828e-72501193cd1c resourceVersion: "43177" uid: dd84e74f-9356-4411-b026-e25c76f56082 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T17:22:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bf211ff7-9129-4784-a1ca-d219164267fb"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:22:53Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:59:26Z" name: deployer-dockercfg-f78k7 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: bf211ff7-9129-4784-a1ca-d219164267fb resourceVersion: "43310" uid: b1dcb51b-ce31-42a5-94e5-ef553cc579bc type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:190c100124a8a1ff1721a4d1badff89e8f52aa064d94079c700f73c02af4b7ee creationTimestamp: "2026-04-17T17:23:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T17:23:23Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "4055" uid: 96fb7dbb-c01c-44b4-aa95-97c1a974763c type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T17:28:39Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: da1acf33-a14d-4714-8a4c-d0f8808f928f service.beta.openshift.io/expiry: "2028-04-16T17:28:39Z" creationTimestamp: "2026-04-17T17:28:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"da1acf33-a14d-4714-8a4c-d0f8808f928f"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T17:28:40Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: da1acf33-a14d-4714-8a4c-d0f8808f928f resourceVersion: "7653" uid: b0b0477f-d7d4-4a17-8a94-5d7d43fe16b7 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-17T17:23:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T17:23:23Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "4054" uid: 249f0fed-5d1b-4965-abf6-37f6649a1731 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-17T17:22:27Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-17T17:22:27Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1618" uid: 27b080ac-34c3-4319-abec-99940f75f676 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-17T17:22:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0d1c2214-8c3f-4e5d-81a1-a12e0ae81a1a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:22:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:59:24Z" name: node-ca-dockercfg-kltqm namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 0d1c2214-8c3f-4e5d-81a1-a12e0ae81a1a resourceVersion: "43100" uid: 7d6491c8-0dcb-4291-b8b8-3971d701839f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-17T17:23:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9ee0ef1f-18c4-4a3e-8796-73152b4288c8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:23:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:59:27Z" name: pruner-dockercfg-h9tws namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 9ee0ef1f-18c4-4a3e-8796-73152b4288c8 resourceVersion: "43371" uid: 260ba008-4ead-45e6-a436-3dfb1659cbb7 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-17T17:23:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"61623d50-4a70-4038-b583-0075986a2a9c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:23:23Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:59:27Z" name: registry-dockercfg-pcbgd namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 61623d50-4a70-4038-b583-0075986a2a9c resourceVersion: "43370" uid: 74f015f7-c86d-4ef1-b907-6608f1d69e1a type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "45920"