--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-03-12T13:35:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c90cc975-fe0a-47fa-a244-f5a4274c3c2f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-12T13:35:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-12T13:35:28Z" name: builder-dockercfg-pdxlc namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: c90cc975-fe0a-47fa-a244-f5a4274c3c2f resourceVersion: "4357" uid: d8e0c47a-5183-46b9-93a1-1e5cb2e8f047 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE4OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-03-12T13:35:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ddc1a007-7175-440e-93a7-d53e2c0736c7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-12T13:35:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-12T13:35:26Z" name: cluster-image-registry-operator-dockercfg-85kfl namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: ddc1a007-7175-440e-93a7-d53e2c0736c7 resourceVersion: "4105" uid: eda83944-1c5b-4251-aabd-a9cf9093083b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-03-12T13:35:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ad2b7a60-7ba0-4945-9538-56288b60cc2d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-12T13:35:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-12T13:35:26Z" name: default-dockercfg-gcd5f namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: ad2b7a60-7ba0-4945-9538-56288b60cc2d resourceVersion: "4107" uid: 19375104-3b88-4b37-afc5-d5f0a906e5b5 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-03-12T13:35:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b0a535ef-47f4-4008-81a1-28a82e2a2f3d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-12T13:35:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-12T13:35:28Z" name: deployer-dockercfg-8kz7q namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: b0a535ef-47f4-4008-81a1-28a82e2a2f3d resourceVersion: "4355" uid: 0860db19-f4c2-4491-a856-342bedd7cdfd type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:ce6c2180c23883bdb558864c607731fe4c566401b8f58e246e37f223ffb432da creationTimestamp: "2026-03-12T13:35:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-03-12T13:35:25Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "3971" uid: 8f7f4da2-540e-4832-9862-29c504400adf type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-03-11T13:38:44Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: e1436652-374e-43f1-b1f3-604c3f6e205b service.beta.openshift.io/expiry: "2028-03-11T13:38:44Z" creationTimestamp: "2026-03-12T13:38:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"e1436652-374e-43f1-b1f3-604c3f6e205b"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-03-12T13:38:45Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: e1436652-374e-43f1-b1f3-604c3f6e205b resourceVersion: "6768" uid: 2640b4fa-ccb1-4fba-ad64-faee5b02f707 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-03-12T13:35:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-03-12T13:35:25Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "3963" uid: f1b807c8-19d8-4145-bf56-ba829f73aa3b type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-03-12T13:34:46Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-03-12T13:34:46Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1692" uid: 0da162f3-bed7-4245-9238-9fe60a514ffc type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-03-12T13:35:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0439afd4-5b5f-4bf9-bc5f-4f8348dcec6e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-12T13:35:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-12T13:35:26Z" name: node-ca-dockercfg-2xpcw namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 0439afd4-5b5f-4bf9-bc5f-4f8348dcec6e resourceVersion: "4104" uid: ac237439-2c30-42b9-93f4-177088205d73 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-03-12T13:35:24Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5084a736-1a5b-4822-99eb-79d8f9f2846e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-12T13:35:24Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-12T13:35:29Z" name: pruner-dockercfg-q7pdx namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 5084a736-1a5b-4822-99eb-79d8f9f2846e resourceVersion: "4382" uid: fb64d417-978c-419d-bffa-a48bae8710b5 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-03-12T13:35:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"547289e3-33eb-42ea-b59d-b4e3c27f2e4c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-12T13:35:25Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-12T13:35:29Z" name: registry-dockercfg-9d7nr namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 547289e3-33eb-42ea-b59d-b4e3c27f2e4c resourceVersion: "4396" uid: 9b23261a-a809-4442-b122-4592f206c7ac type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21971"