--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T15:05:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e2b01a65-9c51-4e34-b723-f09ebb95ebee"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:05:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:41:35Z" name: builder-dockercfg-ntfj2 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: e2b01a65-9c51-4e34-b723-f09ebb95ebee resourceVersion: "22424" uid: b688acfb-5991-4a36-9220-9e32c96b5fff type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-22T15:05:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0696aa72-08ad-438e-a465-97783d787e41"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:05:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:41:29Z" name: cluster-image-registry-operator-dockercfg-sg5hb namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 0696aa72-08ad-438e-a465-97783d787e41 resourceVersion: "22242" uid: c076391d-56cd-4b6d-9e97-6420e4ec7640 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T15:05:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5b323007-4d97-440c-b41b-34ab8fe57952"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:05:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:41:29Z" name: default-dockercfg-sgjnz namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 5b323007-4d97-440c-b41b-34ab8fe57952 resourceVersion: "22243" uid: ac591eba-6f79-4c44-a5a0-8ce6455a6674 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T15:05:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fe6216b6-1360-4492-8efe-df51ddebe390"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:05:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:41:35Z" name: deployer-dockercfg-6c82w namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: fe6216b6-1360-4492-8efe-df51ddebe390 resourceVersion: "22416" uid: 9c4b519f-4dd0-45c2-a03f-f87528f540b0 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:312fa1f76382c76c7aa73bc5630f76d653808643984356774fd42a7d03f4be4d creationTimestamp: "2026-04-22T15:04:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T15:04:23Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1760" uid: 24ffeda4-c7dd-4abf-8c5b-4886ac3d666f type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T15:08:34Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 2143e006-847d-4848-8d62-02a284a435dd service.beta.openshift.io/expiry: "2028-04-21T15:08:34Z" creationTimestamp: "2026-04-22T15:08:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"2143e006-847d-4848-8d62-02a284a435dd"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T15:08:35Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 2143e006-847d-4848-8d62-02a284a435dd resourceVersion: "6614" uid: 5849e935-ac38-4489-baea-44fe78cfa4cd type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-22T15:04:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T15:04:23Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1759" uid: c9f5b05d-5dbd-4148-8452-16ca63b94f5e type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-22T15:04:21Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-22T15:04:21Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1668" uid: 2f6458ef-c55b-4a95-addd-8929386d81f1 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-22T15:05:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3031a817-4e1f-4e43-8ed7-3807acab9d84"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:05:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:41:29Z" name: node-ca-dockercfg-rrf8w namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 3031a817-4e1f-4e43-8ed7-3807acab9d84 resourceVersion: "22225" uid: 64ad708e-96ff-428c-a7f5-e934972d576b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-22T15:05:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c4f474d4-c921-42f7-9667-f42bfa126062"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:05:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:41:29Z" name: pruner-dockercfg-jbcr6 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: c4f474d4-c921-42f7-9667-f42bfa126062 resourceVersion: "22241" uid: 9904a5f6-d0cb-4e10-bd48-3feb8a0439fc type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-22T15:05:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1e97e175-48f2-4892-abe0-1fabd2e995d7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:05:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:41:29Z" name: registry-dockercfg-jdzns namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 1e97e175-48f2-4892-abe0-1fabd2e995d7 resourceVersion: "22235" uid: b87354df-7f80-4820-bab1-d1dc3b854429 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "27624"