--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T11:26:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:26:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e4d5c0ae-4e3c-497c-9deb-5f0d679a29ac"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:26:31Z" name: builder-dockercfg-4d9k5 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: e4d5c0ae-4e3c-497c-9deb-5f0d679a29ac resourceVersion: "3713" uid: 112a9361-41b4-4c9c-8cf7-8de06d2adb0f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-17T11:26:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5aada356-4b52-48ab-b454-1637057b032d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:26:25Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:26:26Z" name: cluster-image-registry-operator-dockercfg-bgh4t namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 5aada356-4b52-48ab-b454-1637057b032d resourceVersion: "3161" uid: 6aec389c-eb40-4989-aa78-28c4b513afd7 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T11:26:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3696d99a-253f-4eb1-9ac5-b35df223901c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:26:25Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:26:26Z" name: default-dockercfg-xkqwk namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 3696d99a-253f-4eb1-9ac5-b35df223901c resourceVersion: "3162" uid: 43c40b56-7ccf-4808-afc0-513ecf3c0afa type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T11:26:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:26:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"97040d9e-cfc8-42b2-8703-fd400e2c8e08"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:26:31Z" name: deployer-dockercfg-v55sp namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 97040d9e-cfc8-42b2-8703-fd400e2c8e08 resourceVersion: "3714" uid: 85b7f95c-9b0b-44be-ba12-8ccf17dfeb08 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:c94ee4ab6893108ec4a02ab7c722b4abccabbb0cc1daf5f60f6a824a7f51ca5b creationTimestamp: "2026-04-17T11:25:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T11:25:57Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1890" uid: 756fd48e-f3fa-4d59-a0e8-f28232082a28 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T11:32:36Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: cd905658-17ef-4887-940e-9f3da42545ea service.beta.openshift.io/expiry: "2028-04-16T11:32:36Z" creationTimestamp: "2026-04-17T11:32:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"cd905658-17ef-4887-940e-9f3da42545ea"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T11:32:37Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: cd905658-17ef-4887-940e-9f3da42545ea resourceVersion: "7889" uid: c7ee98b2-2c7b-4e01-afda-5f9666f6fa13 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-17T11:25:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T11:25:57Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1888" uid: f7b946d0-4b96-470e-8d0b-bd17c55b00ab type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-17T11:25:54Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-17T11:25:54Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1676" uid: a9679a8d-cc67-4540-a768-fddd614e8143 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-17T11:26:26Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:26:26Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"69357d75-714e-401d-8736-6be3c1ad3fed"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:26:26Z" name: node-ca-dockercfg-5525m namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 69357d75-714e-401d-8736-6be3c1ad3fed resourceVersion: "3163" uid: 8ba5e9ff-305a-44a8-900a-f162e5d4d3d9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-17T11:26:26Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:26:26Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8526f286-1be1-44e1-ba6d-6b500981445e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:26:26Z" name: pruner-dockercfg-bcdp2 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 8526f286-1be1-44e1-ba6d-6b500981445e resourceVersion: "3168" uid: 660ff63c-6e61-4294-8b51-d3eecf61a6bd type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-17T11:26:26Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:26:26Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3eaba359-5d1f-4d5a-be70-70a030485e8c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:26:26Z" name: registry-dockercfg-5ntx8 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 3eaba359-5d1f-4d5a-be70-70a030485e8c resourceVersion: "3179" uid: c2535500-c1b0-4ac3-823d-3223ae453afd type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "19340"