--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T14:49:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fe150c31-b4ec-4c9d-9285-1d6c06e1f8e5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:31Z" name: builder-dockercfg-7wlxh namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: fe150c31-b4ec-4c9d-9285-1d6c06e1f8e5 resourceVersion: "24659" uid: c8e03208-a60a-41e3-a180-7f65e61d4a06 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-16T14:49:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c033d974-5349-4fe1-9bb7-3d01ffc60e55"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:25Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:26Z" name: cluster-image-registry-operator-dockercfg-l4qr7 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: c033d974-5349-4fe1-9bb7-3d01ffc60e55 resourceVersion: "24518" uid: b51fef62-8b4f-4b71-b2af-5c893bd16242 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T14:49:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4b3f44da-0fbd-4c29-8974-f99287f8fcf7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:25Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:26Z" name: default-dockercfg-p254b namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 4b3f44da-0fbd-4c29-8974-f99287f8fcf7 resourceVersion: "24494" uid: 1ce3e9fc-3794-48d4-a286-daf77457b771 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T14:49:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"849555b3-1e6d-44f7-8803-11b7a8d7c17e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:31Z" name: deployer-dockercfg-d4z76 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 849555b3-1e6d-44f7-8803-11b7a8d7c17e resourceVersion: "24666" uid: 090327e5-01a4-429c-a957-52df3096d38e type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:b3b20ffe5ba460e70bbf9e08acb6df28f4bfcd8322cf80627355d76b40727813 creationTimestamp: "2026-04-16T14:48:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T14:48:49Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1882" uid: 205b8ca0-64d6-4d6b-8fa6-a99884f8f1c7 type: Opaque - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVFVENDQXZtZ0F3SUJBZ0lJUTR1bzNRNDR5eVF3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qTTFNVEk0T1RBZQpGdzB5TmpBME1UWXhORFUwTlRWYUZ3MHlPREEwTVRVeE5EVTBOVFphTURZeE5EQXlCZ05WQkFNVEsybHRZV2RsCkxYSmxaMmx6ZEhKNUxtOXdaVzV6YUdsbWRDMXBiV0ZuWlMxeVpXZHBjM1J5ZVM1emRtTXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRRE91TmE5RDRLdkxFN1lYKzhpdlMyQ0tJVFByZVY0OVVaSwpPOC9yMUhZSm9KQ1JzbDJxNmZDQXBRcW5SeTBJdk9ZR1VnTWh1YXNNbms1VkFmamFxR3NUQ3hvWWNlMmFic09KCmlTSmV0N2ZvSSt5ODd6aGtmOVBhVHUxelRxL0NNQS93VXFmVVZGRERRblRVWTBIbjFQQVloK2Z5VTV0UGIwaUQKUWpydWNRVlpoK1g5TE5YMzR0bXJIQUlEaHFrYlNXUWxlTlVVM1FWWm1RYWlXZHB4SkhCeURrcGFUWjlwanBCTQppWG51Ry9KV3YvYmcrd255TzRFOGZ4THFxb0N6VWpWNEVSVUc1SGt3UXQ4ak9uWmFCOVhvaFNTdFVzeU81RW0zCkpnQy9pcEp2eTNDcTVrY0hvT1Fuemp2bFFjUVpMeG5OZmZZTlkrbVRjTW5xZ1dhWVFRUUxBZ01CQUFHamdnRWgKTUlJQkhUQU9CZ05WSFE4QkFmOEVCQU1DQmFBd0V3WURWUjBsQkF3d0NnWUlLd1lCQlFVSEF3RXdEQVlEVlIwVApBUUgvQkFJd0FEQWRCZ05WSFE0RUZnUVVoYWhTMDlvWlpHSVlTS0pDdGZvM2h5a1dGV3d3SHdZRFZSMGpCQmd3CkZvQVVuaUwvQVNuaFFVMURXWmxhcDhwbjNEY2pOTEF3Y1FZRFZSMFJCR293YUlJcmFXMWhaMlV0Y21WbmFYTjAKY25rdWIzQmxibk5vYVdaMExXbHRZV2RsTFhKbFoybHpkSEo1TG5OMlk0STVhVzFoWjJVdGNtVm5hWE4wY25rdQpiM0JsYm5Ob2FXWjBMV2x0WVdkbExYSmxaMmx6ZEhKNUxuTjJZeTVqYkhWemRHVnlMbXh2WTJGc01EVUdDeXNHCkFRUUJrZ2dSWkFJQkJDWVRKREkyTm1RMU5tVTFMVGhpWm1RdE5EVXdZUzFpTkdGakxUQmhaR1JsTXpnNFpEUTEKT1RBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWtJb2kwMnRreXdkQ0lSZHJzLy9kSUdKVGljODc3YkFPR2pFUwo2WFI2NGVYdFJNZzJjR0NGZlhRWExwa04yNjlDY004UHpacldXR0NyYlVHZFIzWWg5aEYyV0J2TVhxRXBTK2pUCnVTQ1ZsMnhQVU5FNXQ5Y1oxRzczeWhTb0xKa1ZOeTIwSVNDK1NsTGYzRkQ0eXUvMVRQc2wwUFg1SG1JSkpKYncKZVgwK1pMMU85eHJwTDdiN3NuTHNXblRpZWkzTWpERDE3ZUM5WUw3eFQwS1RRb3J5M2tLSDMxZzBkT1RRWkxQcwptKzVZODI5eDRUTm41WEIzMllmUVo0akw5cU5QZGdiU1V1MDJEdjdzZlMrYU1VM3hiWlQ3VVhoRFZBblg4Zjh4Ck42TXJRc1hySzJ5WllaeURpVUkyVWxPak5RbFY1Q2JTTUNQWGFzZ2NTcktSRGZqUUJBPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlLWVVHWHNDVmxEQXdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpNMU1USTRPVEFlCkZ3MHlOakEwTVRZeE5EVTBORGhhRncweU9EQTJNVFF4TkRVME5EbGFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WXpOVEV5T0Rrd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFDaWQweTdLTEZ3YzhuV1laaGFHek5rRUtScUtka2pId1pKCk9MZ3psVHIyZDEwVHhDWllXNEJWY3BxakgxZ2tpL05vdkZyQjRXVkEwSENvVGkxWDRPNXVRNnNFMlNlVU5NUWIKQ3crTmlKVFR1dnJ3MkpyY0ZXbFdzejBlMFJ6UWpiUlJHVjg1SU1HcFNYUitQd2psdkFoTGpqTEQwUFRPZkt1RgpBNlYyN2FBRmR3ZjlWSDNUU1BCcGNrblM0MWsxQ0JWUTdEeURPSTJ4ZjFYc3VKd3JtY1ZHQUV2UnlBRmtZdVRFCmJGVUVJLzlPcU9xV2Z3MkRpN0pZdWNDZGZZOExSbzlhRTVvajJtRFhFU1JZcW1PVXhBNnJ5a3lNaWMyV0VaM1MKMHFmdlhUNDBkT1ZPVng5VE1lRU92MTJDMFAwQUpqVm9Uc3BvMG52NXREeVNHRnQ3aUJPUkFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCU2VJdjhCCktlRkJUVU5abVZxbnltZmNOeU0wc0RBZkJnTlZIU01FR0RBV2dCU2VJdjhCS2VGQlRVTlptVnFueW1mY055TTAKc0RBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQW04SWxCVm1CMXVCMy9UN01LS0xpTVpYaG5Xa1hOaGs3ODFqYwpJR0FYcXR6Y0NuT00yWENlMVhHMWY3UU1yZVZYUzVHdzdOQWR5azhYYTJjcTh6Vk55elFOU2pyK1cwcCtvelJmCi85eHJTVEpPRkU1NTh0RFd1c0ZqMGc2TnZOeE9iTk9NZWF6ZXlzNFRWSmF3cUxpUGlELzU3Qk9VbkF4b1VHTUEKVlM5SGJNUzVSQklZMHdIVStudU5HS08xRDd3UEpBdjNWU3Z4ZU03ZUZXZFF2dDR6YWtUSTFUeWRoODVYdytMeQpadFNoQVYwL1VxMUxIbjBmaERXeVlvRGlMQzVPN285bmtXNTlyZVc4UGhMaHhCUmFOcFc5ZWh0SExIbkRLRlV6CkJURVQzdGd4TUJaVTdVb1JoVnFGMldyNDY1WCtQVkhkaGwxRE0xdFpFZ3VvNENVM3BRPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T14:54:56Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 266d56e5-8bfd-450a-b4ac-0adde388d459 service.beta.openshift.io/expiry: "2028-04-15T14:54:56Z" creationTimestamp: "2026-04-16T14:54:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"266d56e5-8bfd-450a-b4ac-0adde388d459"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T14:54:57Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 266d56e5-8bfd-450a-b4ac-0adde388d459 resourceVersion: "7719" uid: 07d33a4a-b3e5-4bbe-ae41-f21748b0d643 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-16T14:48:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T14:48:49Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1878" uid: 007e9820-d550-4f80-8a51-3c2588c734d6 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-16T14:48:46Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-16T14:48:46Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1661" uid: 2521593b-9408-437c-9c3e-be7d92ee3983 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-16T14:49:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ed4a628e-a110-430e-a217-04da40f4ac40"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:25Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:26Z" name: node-ca-dockercfg-xftsh namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: ed4a628e-a110-430e-a217-04da40f4ac40 resourceVersion: "24500" uid: 9de5c9eb-e66f-42bc-8bd5-c840a84bd694 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-16T14:49:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8bd5cbbb-431b-42c9-8c18-ab9a3a47d031"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:25Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:26Z" name: pruner-dockercfg-drlmk namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 8bd5cbbb-431b-42c9-8c18-ab9a3a47d031 resourceVersion: "24507" uid: 6b6dac46-3bbe-4959-be63-537f9f7bd3dd type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-16T14:49:26Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a252e9a8-3b45-4c37-acca-9627c1e5997e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:26Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:26Z" name: registry-dockercfg-g2vw7 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: a252e9a8-3b45-4c37-acca-9627c1e5997e resourceVersion: "24512" uid: c68bce50-1b6d-4c7f-9f67-c20b8b8cf807 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "33911"