--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T14:22:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bb099b7d-5945-4f6b-ad81-7e3680249bc9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:22:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T14:59:16Z" name: builder-dockercfg-7krbn namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: bb099b7d-5945-4f6b-ad81-7e3680249bc9 resourceVersion: "42793" uid: 32b2df91-b100-4099-92dd-1ce99fab4cb8 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-20T14:22:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5c6a3934-3ffc-4f7e-b39e-9a16cfdf4e41"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:22:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T14:59:14Z" name: cluster-image-registry-operator-dockercfg-q2ngc namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 5c6a3934-3ffc-4f7e-b39e-9a16cfdf4e41 resourceVersion: "42704" uid: 9ee28ae6-0f91-457d-afb2-f6b9cb3539d8 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T14:22:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"43696c26-1736-4de6-802b-db42bd429e85"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:22:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T14:59:14Z" name: default-dockercfg-5hjd7 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 43696c26-1736-4de6-802b-db42bd429e85 resourceVersion: "42600" uid: b20aa6e8-497f-4d5a-9e84-c8cb6df77e5e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T14:22:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9c6093ed-d322-4ba0-8dff-f4df219edfb8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:22:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T14:59:16Z" name: deployer-dockercfg-tnt78 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 9c6093ed-d322-4ba0-8dff-f4df219edfb8 resourceVersion: "42808" uid: 7a860886-2c96-4229-b4d2-78b2e317b463 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:6af87e580953efe803b29fd670ef0ddb5c2e4ba734e0bcdca36aedd6b884a594 creationTimestamp: "2026-04-20T14:23:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-20T14:23:14Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "4006" uid: 5d34122b-f675-483a-a25b-6a74ca72689d type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T14:28:36Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 0c57eb9d-ef6f-4be8-96c2-b9acfc0d281a service.beta.openshift.io/expiry: "2028-04-19T14:28:36Z" creationTimestamp: "2026-04-20T14:28:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"0c57eb9d-ef6f-4be8-96c2-b9acfc0d281a"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T14:28:37Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 0c57eb9d-ef6f-4be8-96c2-b9acfc0d281a resourceVersion: "7643" uid: 52d4c96e-ea8a-495a-bad3-cc14763efd28 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-20T14:23:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-20T14:23:14Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "4004" uid: e066b494-ee5e-4dd0-87c4-c3c792fdbe31 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-20T14:22:29Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-20T14:22:29Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1657" uid: 69b3134b-0765-4107-977a-8a5b4334729b type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-20T14:22:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"aa3e9617-4995-4fc1-8ce7-3ab3e04d779d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:22:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T14:59:14Z" name: node-ca-dockercfg-lslm2 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: aa3e9617-4995-4fc1-8ce7-3ab3e04d779d resourceVersion: "42654" uid: a6a349d9-cd61-4101-8648-cb5b2c193a99 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-20T14:23:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"739f34da-a627-45aa-93cf-06ab2b353aea"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:23:12Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T14:59:17Z" name: pruner-dockercfg-6hdbp namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 739f34da-a627-45aa-93cf-06ab2b353aea resourceVersion: "42896" uid: 34161efe-b17f-465b-80d5-5b17d6bf2a33 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-20T14:23:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0608158d-54de-475a-b249-ded01017688f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:23:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T14:59:17Z" name: registry-dockercfg-bsqq7 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 0608158d-54de-475a-b249-ded01017688f resourceVersion: "42894" uid: 74b3464c-de09-48a5-a126-944bc06d81d8 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "47050"