--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T16:44:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"63013505-5c05-4102-8da5-8810a12f6fcc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T16:44:13Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T17:20:48Z" name: builder-dockercfg-vrql4 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 63013505-5c05-4102-8da5-8810a12f6fcc resourceVersion: "25556" uid: f3bdb177-ae96-463e-8979-85584cfed0f9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-16T16:44:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9f74da16-18e7-4f96-9ea1-85b6c9bad6b4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T16:44:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T17:20:47Z" name: cluster-image-registry-operator-dockercfg-xw8ls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 9f74da16-18e7-4f96-9ea1-85b6c9bad6b4 resourceVersion: "25482" uid: ce6923fa-641b-41eb-8ab6-03f094a26aef type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T16:44:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f906d1fd-4c34-4778-9494-7b90c832a5b0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T16:44:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T17:20:47Z" name: default-dockercfg-qnrrk namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: f906d1fd-4c34-4778-9494-7b90c832a5b0 resourceVersion: "25473" uid: 5b5f8ae8-60a0-4183-a161-932a964a34d4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T16:44:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d791be32-7d6e-4cbb-b19a-680b7cedf780"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T16:44:13Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T17:20:48Z" name: deployer-dockercfg-7vsmj namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: d791be32-7d6e-4cbb-b19a-680b7cedf780 resourceVersion: "25583" uid: dc5475b1-7122-4a2f-abf5-9e6d1a0d006c type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:8d4757301a352f6be6b317caf824605118d9396ce35c01030994fbac54fa74f2 creationTimestamp: "2026-04-16T16:44:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T16:44:46Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "3986" uid: 12d8f395-e9df-4de4-a20e-14b99b3cdb48 type: Opaque - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVFVENDQXZtZ0F3SUJBZ0lJY2N6THdKakZ4NVV3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qTTFPREU1T1RBZQpGdzB5TmpBME1UWXhOalV3TURWYUZ3MHlPREEwTVRVeE5qVXdNRFphTURZeE5EQXlCZ05WQkFNVEsybHRZV2RsCkxYSmxaMmx6ZEhKNUxtOXdaVzV6YUdsbWRDMXBiV0ZuWlMxeVpXZHBjM1J5ZVM1emRtTXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRQzVxdExoTjliamM1Y0x0dlpxN1QwOEJ4R0RjUGZkSXg0TAp2SmpVRnE4dUJjbFhDRWNuaHRJbnpFTUZudkVmaHlCZFNLWFZwU3dzOERaMUd4MDhtY0RaQTgwMEtjc1RaY25hCkduTjQ2V0s0VSt6QU0zQ0l5N3NWVzVqYzYrQXZoekVmV2VQUVpHYWRpV2J5aVJVbXdzYjRtdVN6TUlhcitUSysKOEI4NUdoclVpck9GNWM2ZXFPN2sxRjZwWGQ2aDRZeUZMMnhSWHNTZjBnVGFqVU5EeXNrRmJTZFhPN3ZWRzh5MApBdGFEQStjZlo0WVovUFp6Y0hkYWgwdlpXbXEySkxWQWd0WnR6VVZtajl6ekFhaldrOVphVHJOWU1FZThXTDIvCkN5R3JXNFo4aVJrK0pINkFHeFBYcGI3a1MzOGQyU3BjR1RHME9YMXVCdXh3eUh5KzJNNC9BZ01CQUFHamdnRWgKTUlJQkhUQU9CZ05WSFE4QkFmOEVCQU1DQmFBd0V3WURWUjBsQkF3d0NnWUlLd1lCQlFVSEF3RXdEQVlEVlIwVApBUUgvQkFJd0FEQWRCZ05WSFE0RUZnUVVUeTNtYkpiNnJRRUdmVVU2LzB4T3NwU1kvVzR3SHdZRFZSMGpCQmd3CkZvQVU3MGFMcnBFMzUwU1pITUlXaURvTytLRzJOTTR3Y1FZRFZSMFJCR293YUlJcmFXMWhaMlV0Y21WbmFYTjAKY25rdWIzQmxibk5vYVdaMExXbHRZV2RsTFhKbFoybHpkSEo1TG5OMlk0STVhVzFoWjJVdGNtVm5hWE4wY25rdQpiM0JsYm5Ob2FXWjBMV2x0WVdkbExYSmxaMmx6ZEhKNUxuTjJZeTVqYkhWemRHVnlMbXh2WTJGc01EVUdDeXNHCkFRUUJrZ2dSWkFJQkJDWVRKRGhsTldVM1kyRTVMV05qWmpjdE5HTmpZaTA0T0RkaExUUmlNVEE1TURreE9HUmsKTkRBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQXlJWlBtbTNhTGFVaGpJaXRvdzlYNVhJdThQL1o0WnlwT0FnZwowcmRDT1ZqWVBaNVVZVks0dVVWaXNYb1E0RTJIbEZxd3NmY2gxakh1SlJyN0orcUg3NldwL2NEaldSSWoxVS80CnVFNENkRkJUMWRhZkFxblhwZG1PRUoxSHg2ZG5mSk9yZ0x4Y09tSmU1YWVEWXN2dXBxYjVnQ09tbERoRHcxSVUKY0JQNU5yWnB4SVhhemI0OVJoR05mU1NsRll1ZkRua3lYczR1bjQxM0taYWRINmkvYTloR0xUcVhxQ0d5QkIwRwpTSFh2QjV5eS9YWnczb0l2Vjcwc3NaeEpPaFBLbjVLZVpWc0cxd1NRYkpEZDNOS2R5N3pWUzg3dTdJNTFyOG4wCjlLZ2pNZE0zRjVselZtQU1DL2ZyRGlVOHIzeENDNXR3R2YxRTZaVXhLWEdrbU9GMTdRPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlMd2tmQ3RtZDd4Z3dEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpNMU9ERTVPVEFlCkZ3MHlOakEwTVRZeE5qUTVOVGhhRncweU9EQTJNVFF4TmpRNU5UbGFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WXpOVGd4T1Rrd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFEakRzZFdrY0pOYStFemRtcnBTV1NuNW9ZL1ZDWktUVHFaCng1cDYxK0lkOGc2UWFleHFmUUJGUW04dmhWZzhhVGJ1MjdHcEpRc2tyVkU0M0QzdnpCRlNMa3J5K0M2NVRMelkKcGNJV3VOanI3MldsVmRiaGRkZG5zN3RBQWFScnNwQWtvRUFqT1EvRGlud3NvZ0VDL0ZHckMwYWJEQTlGd1NUKwp5ZUZmSktIUXRYazJveVcvL1d5UXFRbHBNSFUzbmxaSDgzNk9UTHdkY2xKeUFtTEQ0dkRuQ2kzVEtzekwybVlsCmt6b1BXb0VYY1FCV2Jmakp1cXltRWd5TE1OY1BvUFVaYVg5QjJDTWN4b0R0V2FSaXlFY1ZoODFtbnpXMWwzOWcKVHRrUmR4ZkYxczQxSUNQRkN1L2puRnluUGdOU0tYTEpRYzRHT2p6WXEyaUl6a2dsRW1TbEFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCVHZSb3V1CmtUZm5SSmtjd2hhSU9nNzRvYlkwempBZkJnTlZIU01FR0RBV2dCVHZSb3V1a1RmblJKa2N3aGFJT2c3NG9iWTAKempBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQXFwRllDdFh3M3o4dVJVQmhtUS81RU9NMnhycmVvazcwWWFjNApubHJGWFBVNC84MHJQNUNrN0t3N1ROVmNxb0ZaTTUxQjZZMnlCa2pHdll3SHp6YXlpcjV2R1UvZDg4aDQ0OTcxCjE1bjJ1OHd4eGcwc2VaYmpneDZVZms0OCtBWDE4VCthS09RY2xYaE4xUlpVTWwvUldjd1hhckNxcWdkY3NqdDkKUDJTM3RPMmZJbTBteGV5S2ZxL0l5ZFA5TWtuRnpETzFqNmhjKy82cU5qZy9raUNaWVFiZmVYVkhrQ20reGhaWQowM041QWRXT1dSOFRhaTBUTlpHZXBCdjEvclhPaEt0bDhDeW5sS25lY1hpbFVTOVAxMGNBcFZ2OVpBNkt6Y3JhCjlZbWZ6R0VnanBKSmViN0xWOEZvMWtRL3JLTTEyNyt2OU9FMWNKN0c2THdhUTJBRUFBPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T16:50:06Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 8e5e7ca9-ccf7-4ccb-887a-4b1090918dd4 service.beta.openshift.io/expiry: "2028-04-15T16:50:06Z" creationTimestamp: "2026-04-16T16:50:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"8e5e7ca9-ccf7-4ccb-887a-4b1090918dd4"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T16:50:07Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 8e5e7ca9-ccf7-4ccb-887a-4b1090918dd4 resourceVersion: "7658" uid: 3dc82abf-8de3-42dc-be64-b679296e8109 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-16T16:44:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T16:44:46Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "3984" uid: 45243bba-d661-4bf5-aca9-9a3aff21e514 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-16T16:43:51Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-16T16:43:51Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1692" uid: 621a0f0f-bf48-4e31-8366-2cd44fbb4461 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-16T16:44:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e2ac5c60-37cd-4077-a0fb-feccaceca985"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T16:44:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T17:20:47Z" name: node-ca-dockercfg-hnwcx namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: e2ac5c60-37cd-4077-a0fb-feccaceca985 resourceVersion: "25505" uid: fb69e61e-b7c3-4a5a-ae45-4b94a2787f09 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-16T16:44:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"06e2a677-fa75-413d-8c6a-63a34af01352"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T16:44:45Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T17:20:50Z" name: pruner-dockercfg-h5z6x namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 06e2a677-fa75-413d-8c6a-63a34af01352 resourceVersion: "25671" uid: b5689559-16ae-4481-9295-ebfd18e0bff9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-16T16:44:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1b0601a4-ccca-4181-be01-798b467fb361"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T16:44:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T17:20:50Z" name: registry-dockercfg-djqlx namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 1b0601a4-ccca-4181-be01-798b467fb361 resourceVersion: "25674" uid: 88f18968-d8c5-48e3-a3ac-5e4dd4a0a1ce type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "41454"