--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T10:14:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fb436a94-cab9-4b88-85b0-2300e706c50f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T10:14:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T10:50:47Z" name: builder-dockercfg-7qlzh namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: fb436a94-cab9-4b88-85b0-2300e706c50f resourceVersion: "22127" uid: 981c034b-a418-41d0-b727-0394608a1ecf type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-17T10:14:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"86abed32-a3cc-46d0-a447-0df38bdf0151"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T10:14:41Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T10:50:42Z" name: cluster-image-registry-operator-dockercfg-bpvtk namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 86abed32-a3cc-46d0-a447-0df38bdf0151 resourceVersion: "21974" uid: 76b1d286-50bf-4d30-8b8f-1e24719ecb1d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T10:14:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d9b43ec0-2af3-4a9a-8821-9310ddbe04aa"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T10:14:41Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T10:50:42Z" name: default-dockercfg-szkvn namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: d9b43ec0-2af3-4a9a-8821-9310ddbe04aa resourceVersion: "21962" uid: b5b2ffff-357f-4cb3-8b1b-31f3ad60bf98 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T10:14:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8cbf1a68-ebdf-4752-8859-59505160bfc6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T10:14:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T10:50:47Z" name: deployer-dockercfg-g2dpx namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 8cbf1a68-ebdf-4752-8859-59505160bfc6 resourceVersion: "22112" uid: fa08736e-7b43-4845-bd69-8143f8860b7a type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:8cdad1454c76a11b363eecb53bee0c81579c0dcb1f53e5a88df525eef0f4d2ab creationTimestamp: "2026-04-17T10:14:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T10:14:36Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "2986" uid: 0d61ffe9-f4d8-482d-ae6e-b7d9edf824a2 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T10:18:07Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: f429c267-6f1d-4162-a5e5-7abcfd10bef9 service.beta.openshift.io/expiry: "2028-04-16T10:18:07Z" creationTimestamp: "2026-04-17T10:18:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"f429c267-6f1d-4162-a5e5-7abcfd10bef9"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T10:18:07Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: f429c267-6f1d-4162-a5e5-7abcfd10bef9 resourceVersion: "6045" uid: e90c1336-b89c-423b-b524-848330880412 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-17T10:14:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T10:14:36Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "2980" uid: b90b79ab-5f7a-4f3b-a3f2-68a6a8c8a737 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-17T10:14:04Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-17T10:14:04Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1662" uid: ff7dd555-d0fd-43ce-87e1-24ae7d3d38f6 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-17T10:14:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0031acaf-92e5-45ac-88fa-970ac545a5d7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T10:14:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T10:50:42Z" name: node-ca-dockercfg-tbk5h namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 0031acaf-92e5-45ac-88fa-970ac545a5d7 resourceVersion: "21953" uid: e55bdc2f-037a-4230-a8e8-c8e94ca76728 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-17T10:14:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"db10ed84-f19d-42a3-be4e-437d1f44bf36"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T10:14:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T10:50:42Z" name: pruner-dockercfg-dckdb namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: db10ed84-f19d-42a3-be4e-437d1f44bf36 resourceVersion: "21963" uid: d79224f3-2555-4f86-a61a-d1aa26365479 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-17T10:14:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"06de6ac6-3d81-421b-a529-c22fe31a18e2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T10:14:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T10:50:42Z" name: registry-dockercfg-mw7t8 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 06de6ac6-3d81-421b-a529-c22fe31a18e2 resourceVersion: "21955" uid: 212630b0-5a95-4a7f-8c4b-d98809cce582 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "26025"