--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-21T10:00:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0e2f688d-d71d-4889-acf0-308a0fb5ec33"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T10:00:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T10:36:19Z" name: builder-dockercfg-kdwrr namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 0e2f688d-d71d-4889-acf0-308a0fb5ec33 resourceVersion: "24947" uid: 422b97e2-98b9-4dab-bb99-5f6556e63af0 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-21T10:00:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c950ba50-9a66-44c0-aef5-c9dcc5f4b80a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T10:00:13Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T10:36:14Z" name: cluster-image-registry-operator-dockercfg-ccwwm namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: c950ba50-9a66-44c0-aef5-c9dcc5f4b80a resourceVersion: "24791" uid: 77054eae-4902-4869-82ba-5a879b98787e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-21T10:00:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"62f5fb9d-bf69-4985-8b28-e7b3e087dde7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T10:00:13Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T10:36:14Z" name: default-dockercfg-98jh2 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 62f5fb9d-bf69-4985-8b28-e7b3e087dde7 resourceVersion: "24788" uid: c7f45791-0f80-486a-a142-39d03124caac type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-21T10:00:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"193c03fb-088f-4f3a-bda6-a79e9c153c8a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T10:00:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T10:36:19Z" name: deployer-dockercfg-r26rn namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 193c03fb-088f-4f3a-bda6-a79e9c153c8a resourceVersion: "24957" uid: b3879f49-2391-478f-8899-2ca1447c9101 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:edf7c8242aae4526a582f76f1702deb37a7c9bdaed68284563e205f4a954d76f creationTimestamp: "2026-04-21T10:00:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-21T10:00:04Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "2026" uid: 851f66cf-0077-4f46-a84f-446829e2bb65 type: Opaque - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVFVENDQXZtZ0F3SUJBZ0lJWG9pRFZzSHNQU2t3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qYzJOVGs0TURBZQpGdzB5TmpBME1qRXhNREEyTWpWYUZ3MHlPREEwTWpBeE1EQTJNalphTURZeE5EQXlCZ05WQkFNVEsybHRZV2RsCkxYSmxaMmx6ZEhKNUxtOXdaVzV6YUdsbWRDMXBiV0ZuWlMxeVpXZHBjM1J5ZVM1emRtTXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRQzRSYlNOY2tBUEFUSnBoL0NMVmFtNWgwRnpzWTM2RWtpTgpadDkrYTdPTWxybUh2WklsT21QYlpOM0V3N0hySlQzbnRTVFNhMWJNNXdRaVdkTmpBYzQvcnVUdnJ1OXpIdWk3CldPNVMvZnlrK0p5eDNpVEI5WjMrbDVRdzV0VHkreStXSVgxQTBIY2RBRHBpMng2ZkUrOGl4WVVvQUJNNEszL2gKRW1XMXlkcitEWmtadXlYeHFlTzh3U1dRRlp3M0FIN1Q5NTJzMmU3bnJmV2E5NjM5OHEvemlQOTc5VnAwR1o2TApESG9IcmZoQndpSlVsUVFvaGpJdkVkaVU0S0hTWEZQUnBwVFp2eGg3SERtSEs5SGlSYzZJWWcxSjYwU0JYSTR6CnJHNU9yRHdKN0w4aGdBL01SYml6QVZjYzNmby9MeFcvSlBGeG9zYy9ESFg5eUpIS0R4d3hBZ01CQUFHamdnRWgKTUlJQkhUQU9CZ05WSFE4QkFmOEVCQU1DQmFBd0V3WURWUjBsQkF3d0NnWUlLd1lCQlFVSEF3RXdEQVlEVlIwVApBUUgvQkFJd0FEQWRCZ05WSFE0RUZnUVViWkdpc3YwcUR2ejY4RmpObHBJbjZMMTI0Y2d3SHdZRFZSMGpCQmd3CkZvQVVwQlJvWEJOM3Y0TlR2ejEvcnZQU3lNSWpZUll3Y1FZRFZSMFJCR293YUlJcmFXMWhaMlV0Y21WbmFYTjAKY25rdWIzQmxibk5vYVdaMExXbHRZV2RsTFhKbFoybHpkSEo1TG5OMlk0STVhVzFoWjJVdGNtVm5hWE4wY25rdQpiM0JsYm5Ob2FXWjBMV2x0WVdkbExYSmxaMmx6ZEhKNUxuTjJZeTVqYkhWemRHVnlMbXh2WTJGc01EVUdDeXNHCkFRUUJrZ2dSWkFJQkJDWVRKRGc0WTJVeE5HWTFMVEF6TlRNdE5HSTJNUzA0TkRneUxUZGlOakl3TURBd1pXRXcKTlRBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVpiTGRsekF2VFNhU2JQem56MWE2TWFWSFVIc2NaNFBtRTBDUAp5ZUdCQmNSMXI5UHZtV3hYQ1ZPZlVrVmZjMTFnN3o5R1R0dFJ3elRkVFFtdDRrd21oZVBDQ2FZYnVkbDNrREJGCmkxVlVrNE8zNHppcVdzYnkvYkF2dkVhZlJCcSsxTFJ6cnl6ejNNUi9wMXFmajUzN1UvNDVsdGpxQjdGWUxZRW4KYmN5UlJOQ1RCVFpDM2VwSnNSQ2hKSVptbUNCaEdYL0Iwajdqb2E4UkFuaWFVdklyWnI4N05VVVJwRnA4SU1UUwpkTWszWFJrSUNkS2t1blh1UThZTzY0UHNrL1g5ZkQ4YVBseGxBcDhSWVFuVkR4UGFKYVg5MXpieXFIRnQrQWtWCnQwbkQ0WC9aVWx1Y2E0M09PUXhWcnQzTHVkMlNHNC9nd2tIYkpWaVFCb09RUXJZcFR3PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlWcEQ5Tkg4RVBKTXdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpjMk5UazRNREFlCkZ3MHlOakEwTWpFeE1EQTJNVGxhRncweU9EQTJNVGt4TURBMk1qQmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTNOalU1T0RBd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFEV3pQdnBNVU1zU1VDSEVsenFHL3RGVFJJdjZUM29PRjFBCjVEYTQwUWRJY082M1ZTc283bmt6V0ttN1NxN1ZpZ210VGNXdlo1NG11aXVrWHFYRUt1OFVIQm43WittL0Y3ejIKTkdpWWlFRm4veG1tb1l5OHU5eFllRDNEcHQyckZ3L2VlcG1yVjRIYzFYNFBQMlJJWjR0Wi8xV0h0UTFCWjh4RgpncFp4TE9yMXhKSHdOdG1wd24wVE1rRVVBc1IrYnpjTmI5dk1Db0x6TzJsWEhzTWkrM0RodEJWQzhjeDAyVDBpCkNmQUF4VWtlRnBFMzBJQWpjM2pFejFOSGw5UjRPY2NIS2lhTFhkUCt5Wk83bHFXZ1UxYWtzNFdZUWdacy9vZ0gKNy9GaTB2amRMN0UrN2NrWUVCNk1YUDJKMW9BTWlzcmFXYnZucUJEM1VrYVBBMGFtQi9oSEFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCU2tGR2hjCkUzZS9nMU8vUFgrdTg5TEl3aU5oRmpBZkJnTlZIU01FR0RBV2dCU2tGR2hjRTNlL2cxTy9QWCt1ODlMSXdpTmgKRmpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVVickFZZUxPNnFObit0aG5oNzV1QlJXdFJ4Ym5veVU0TWRXWApmMkR5TjdjcHd4V2JNYnRkU0JQbUNHTzRxYldxV2FMN2hvNkxzeTV0UFRtUmlQa1VCbFgxOE1odWttMVZOSzVECnExVnh6UG9LY0NOdWQ1T0RuTnhvUUM3RHcrWkJaZ3dNbXBKSWlNSmhISWx1UzNFckJYOXZPRk5CcnVRb0t6ZEQKRDV2Yk1NYkVJYndObmpJZmNoRDVUZExVOEFEVVpFc29OaXZEZ3ZLVm1NeG15OWRVT1BwRGJJRzVUamxreGlNZwpDU2ZJRHFnWGUrRlJ6SjdiL2VTSzFyMGliUFBNdXdHTUExYVpBank1T2dndlJvd2NYK0VNR3d1UUNuNS9NOHUvClZGYTUrbFFhU0JrZDF4WVFlRnFDOStiRTI2ZkNoNDEvdFkrNkZ4L0hpU0F3ZUpaNGF3PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T10:06:26Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 88ce14f5-0353-4b61-8482-7b620000ea05 service.beta.openshift.io/expiry: "2028-04-20T10:06:26Z" creationTimestamp: "2026-04-21T10:06:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"88ce14f5-0353-4b61-8482-7b620000ea05"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T10:06:27Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 88ce14f5-0353-4b61-8482-7b620000ea05 resourceVersion: "7564" uid: 87a5e836-1537-4c75-a443-86bc10e4578a type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-21T10:00:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-21T10:00:04Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "2025" uid: f15df1b8-aba2-44e0-9a95-726a5153c2b5 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-21T09:59:57Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-21T09:59:57Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1872" uid: edc89c2c-19d6-4e89-9831-1df77b975ca2 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-21T10:00:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2355bd82-8f04-4c3b-92c0-09e2453cb361"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T10:00:13Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T10:36:14Z" name: node-ca-dockercfg-vj7ql namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 2355bd82-8f04-4c3b-92c0-09e2453cb361 resourceVersion: "24785" uid: da8334f5-e7f9-4045-acc5-cd2b0ce8133d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-21T10:00:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5fede9ae-9796-49dd-9b41-404eb74f6173"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T10:00:13Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T10:36:14Z" name: pruner-dockercfg-bfxd2 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 5fede9ae-9796-49dd-9b41-404eb74f6173 resourceVersion: "24798" uid: 3a7a46b5-10c5-4830-9724-911fb1ab9e03 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-21T10:00:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"491ff6f3-3309-4ea6-8742-a4c4ccaead7b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T10:00:13Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T10:36:14Z" name: registry-dockercfg-7p24h namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 491ff6f3-3309-4ea6-8742-a4c4ccaead7b resourceVersion: "24790" uid: 4c76a9f9-f3f5-4ebc-a83f-fc62c6742ac5 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "42390"