--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T12:11:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"07cd5c07-81ce-4a81-8c83-247dadcd8fdd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T12:11:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T12:47:07Z" name: builder-dockercfg-tg4z2 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 07cd5c07-81ce-4a81-8c83-247dadcd8fdd resourceVersion: "22139" uid: 7aa616e9-20a0-4284-89f0-f126c989f76a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-20T12:11:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bef97461-84a1-4ab9-96de-1fd79e914810"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T12:11:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T12:47:01Z" name: cluster-image-registry-operator-dockercfg-6twqt namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: bef97461-84a1-4ab9-96de-1fd79e914810 resourceVersion: "21951" uid: 7883936f-1240-4d3d-9777-860450d57c20 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T12:11:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"76ff036c-058f-4cf4-8a09-4ec8a9a89f78"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T12:11:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T12:47:01Z" name: default-dockercfg-bvt45 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 76ff036c-058f-4cf4-8a09-4ec8a9a89f78 resourceVersion: "21946" uid: 026812f6-8a72-46c5-8891-ed53de3ece77 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T12:11:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"35f4eed4-cc84-4ae1-bce0-91507a2c7fb1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T12:11:06Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T12:47:07Z" name: deployer-dockercfg-r8f7r namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 35f4eed4-cc84-4ae1-bce0-91507a2c7fb1 resourceVersion: "22150" uid: e6a15c6f-3fdb-4f61-ae5a-223233b04e82 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:f342fa73a981fbcf6bb4a5b1dafa1d798550f4967bbc0dcbd8ba1c7b565e5465 creationTimestamp: "2026-04-20T12:10:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-20T12:10:38Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1814" uid: 16ddd52d-80ac-4176-9a99-cf6032e9e8ab type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T12:14:55Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 698d2b27-98d0-4567-b8c4-6b16de97f22f service.beta.openshift.io/expiry: "2028-04-19T12:14:55Z" creationTimestamp: "2026-04-20T12:14:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"698d2b27-98d0-4567-b8c4-6b16de97f22f"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T12:14:56Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 698d2b27-98d0-4567-b8c4-6b16de97f22f resourceVersion: "7232" uid: ff8ebebb-ee70-4efe-98b5-426aa3a17603 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-20T12:10:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-20T12:10:38Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1813" uid: f269f3a7-ecb5-462d-a752-514aa6510d2a type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-20T12:10:37Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-20T12:10:37Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1709" uid: b52f6a1e-cafd-458d-a258-1fa394fc12ea type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-20T12:11:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"38de9d3c-991b-467e-a5c6-d5849e41532d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T12:11:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T12:47:01Z" name: node-ca-dockercfg-rh5tl namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 38de9d3c-991b-467e-a5c6-d5849e41532d resourceVersion: "21961" uid: 215ac388-936d-414c-9208-013ebbc7fd81 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-20T12:11:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"03f77118-f2a6-45af-855d-ff6ad820fa0c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T12:11:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T12:47:01Z" name: pruner-dockercfg-vq92w namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 03f77118-f2a6-45af-855d-ff6ad820fa0c resourceVersion: "21958" uid: b807bdf3-e523-4911-b948-db4b01c1f869 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-20T12:11:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"16def47a-4d54-4049-8354-8f4f2c33a20a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T12:11:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T12:47:01Z" name: registry-dockercfg-2vqb9 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 16def47a-4d54-4049-8354-8f4f2c33a20a resourceVersion: "21957" uid: fb925082-982b-42ab-8205-82c5c4f670e7 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "26703"