--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T17:04:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9d6b5c74-bb64-4895-a134-fa462706364b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:04:00Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:40:05Z" name: builder-dockercfg-h4wgs namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 9d6b5c74-bb64-4895-a134-fa462706364b resourceVersion: "42937" uid: 79545704-fa5c-4dac-a196-46102d1be5f3 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-17T17:03:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5b007116-61bd-427c-972b-97ff206c3c02"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:03:58Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:40:02Z" name: cluster-image-registry-operator-dockercfg-7wwq9 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 5b007116-61bd-427c-972b-97ff206c3c02 resourceVersion: "42728" uid: dc3b9b52-3d41-434a-8930-6b0ce74f1a9c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T17:03:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"242ac91f-6df1-4e4b-b15b-6080140243d5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:03:58Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:40:03Z" name: default-dockercfg-4hhd9 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 242ac91f-6df1-4e4b-b15b-6080140243d5 resourceVersion: "42841" uid: 5f969ea9-a331-4903-84cd-1f6bc8bf341e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T17:04:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a1738cf1-ee29-4006-a9af-195cb5a12e98"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:04:00Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:40:05Z" name: deployer-dockercfg-k8gs4 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: a1738cf1-ee29-4006-a9af-195cb5a12e98 resourceVersion: "42953" uid: 121c13fc-ffb4-4e8e-b7a9-e5a5eee48081 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:446181dd7475c9388863d7dc91cef8b3b6dbaec81bc4243979a31e9c607325ac creationTimestamp: "2026-04-17T17:04:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T17:04:02Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "3560" uid: 3d8be9b9-6e16-48d3-9ac0-bb05e8c9bf3f type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T17:09:46Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: a3b5e0ed-2f74-4247-8088-7dc46e7908c4 service.beta.openshift.io/expiry: "2028-04-16T17:09:46Z" creationTimestamp: "2026-04-17T17:09:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"a3b5e0ed-2f74-4247-8088-7dc46e7908c4"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T17:09:47Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: a3b5e0ed-2f74-4247-8088-7dc46e7908c4 resourceVersion: "7724" uid: 17e7bdf0-d1a7-4c36-a192-13c0aa9fc8ea type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-17T17:04:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T17:04:02Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "3558" uid: 581f5e9c-3420-401c-a235-8535adff3a7e type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-17T17:03:28Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-17T17:03:28Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1691" uid: 5eddd5ff-c032-4764-921f-151b8fc7abe3 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-17T17:03:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"348210fc-5354-49a7-afae-3c4eaa869271"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:03:58Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:40:03Z" name: node-ca-dockercfg-2thgw namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 348210fc-5354-49a7-afae-3c4eaa869271 resourceVersion: "42852" uid: 029c785a-23d7-4c60-8f93-54429c0e63df type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-17T17:04:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3879470a-af2c-4391-a733-75626ee0925c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:04:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:40:05Z" name: pruner-dockercfg-7r52p namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 3879470a-af2c-4391-a733-75626ee0925c resourceVersion: "42978" uid: e19c97c7-f38b-4328-b7b4-4a4f3a24eed5 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-17T17:04:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d0c7e329-1990-484f-ac26-bb0bacde4988"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:04:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:40:06Z" name: registry-dockercfg-b4xpj namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: d0c7e329-1990-484f-ac26-bb0bacde4988 resourceVersion: "43007" uid: 6b5d3335-b07f-437d-93a1-0a8bf860be88 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "46167"