--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T14:49:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7f92c78f-f535-47e6-bda0-90bb50966ab8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:34Z" name: builder-dockercfg-vqhnj namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 7f92c78f-f535-47e6-bda0-90bb50966ab8 resourceVersion: "38212" uid: 1bb33a6e-9bd1-4f5a-86fc-1c7da7f67dd9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-16T14:49:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5b59d470-3de9-416a-a6d0-31668722d925"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:29Z" name: cluster-image-registry-operator-dockercfg-v68hc namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 5b59d470-3de9-416a-a6d0-31668722d925 resourceVersion: "37905" uid: bdf8466f-7c5e-4e01-9112-5880edb73294 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T14:49:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"acb4d9ac-9914-45f1-b182-50c5c9d58a42"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:29Z" name: default-dockercfg-m2rvw namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: acb4d9ac-9914-45f1-b182-50c5c9d58a42 resourceVersion: "37920" uid: e7d2e357-d3b6-4656-b93a-ad7a8a9c61ed type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T14:49:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bf614989-abe5-424a-8403-418a5c94c0d0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:34Z" name: deployer-dockercfg-s9d6k namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: bf614989-abe5-424a-8403-418a5c94c0d0 resourceVersion: "38199" uid: 4451a3b9-dafd-4f5a-8a0b-036140f264fd type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:885c9cfd4c9196f3c2a7ca3ed26f15a0f92f1722a7be8e566a29f21d3fd2af0d creationTimestamp: "2026-04-16T14:48:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T14:48:55Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "2091" uid: c6497683-8cd3-4027-83e4-f295f4bd92a8 type: Opaque - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVFVENDQXZtZ0F3SUJBZ0lJTldGTjkvaGg0eGd3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qTTFNVE13TmpBZQpGdzB5TmpBME1UWXhORFUxTVRCYUZ3MHlPREEwTVRVeE5EVTFNVEZhTURZeE5EQXlCZ05WQkFNVEsybHRZV2RsCkxYSmxaMmx6ZEhKNUxtOXdaVzV6YUdsbWRDMXBiV0ZuWlMxeVpXZHBjM1J5ZVM1emRtTXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRQzhIRy91b0pJTVpEMHU4c2pmUlBXSU1UNnplYnNNRzY0UQpPc3gvcmZBRjJjVXhrZnpJK1ZORmcxNUt1MWxMWll5Ym1uTGNLN1gxa0VCTFZFdFZkV0xUeWg5Q3RRcVpEaXZ0CnZFb3RwdnVOM2J6bGRRQ3FtMGkwZS9jbVFoMll0UXlaallreVhQVUFJWU9wT1pXOTdyZ2RWZHBCd0htVWJ6UTYKNVRpditLOHpnRzFmT2drV3AxaG40Sm5JbGU1ZW9zSDBvLytyR0xpUHBybVQ1dUIwRXdGK0dGR1o3OTRnTkU1Ywo4dkhTRFJIcGlCQ2tVOVJpT0MwVTJSSmxzSWZJRW9XOVRkczM0NVpYZTEwRDhXOFhPUG5rUVdVWTl4RjBoQUVrClVJOS9pQjJjSXNmbWNLeEFyU01HYkc5OWg5amFyNTZaTWVmYkJ6VG81UjNtR2oxaXFRN3RBZ01CQUFHamdnRWgKTUlJQkhUQU9CZ05WSFE4QkFmOEVCQU1DQmFBd0V3WURWUjBsQkF3d0NnWUlLd1lCQlFVSEF3RXdEQVlEVlIwVApBUUgvQkFJd0FEQWRCZ05WSFE0RUZnUVVTZisrOHc3NTYzZk9XTWY0KzFCRGxrMHBIU0l3SHdZRFZSMGpCQmd3CkZvQVVyVCtvcW9hcG93bk10L2YwUnNScGtkd29zZ3d3Y1FZRFZSMFJCR293YUlJcmFXMWhaMlV0Y21WbmFYTjAKY25rdWIzQmxibk5vYVdaMExXbHRZV2RsTFhKbFoybHpkSEo1TG5OMlk0STVhVzFoWjJVdGNtVm5hWE4wY25rdQpiM0JsYm5Ob2FXWjBMV2x0WVdkbExYSmxaMmx6ZEhKNUxuTjJZeTVqYkhWemRHVnlMbXh2WTJGc01EVUdDeXNHCkFRUUJrZ2dSWkFJQkJDWVRKRFppT1RZMk1EQXdMVE01TWpVdE5EQTVPUzA1TlRreUxURmtNR0V6TW1Ga05URmoKTmpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWNjYjR0SXpkQytXVER5WjZKOENaVU85ZnY5anEzM3hhUldHagphbUZ0Q3JOYXErRkVWS2lZL0g4ZkNwQW1XMGN1djcrYzFWZkJGQWppR2hTbWdiWnhJdWpud3EyMFV3MGhSYUFGCitoTlBRSHRNNGJIdjg0MkUzSyt4OWR3TGdBbFZpOEhJamlLWXlFYzRhcm5jSUkyczF3ZGFlcWFGQ2N1MEpCWUUKd213bHZtUVRyYWpkWktEVmxQczc5bUN2cVBRODIyRWZENXNmWTdUaW9WYVBmZ25RTjlxSjBFeXpoZDdYbE5ZMAovRCtIcGVMU2d3SzdzYjE0eThTc045UHdPVDQ0aFJjdEVFcWZLR0RNenVmWDEwSDBHZ1h3RGJYNEM5RGlpQVZ3CkFwM1BEdGkyc3hsN1p1ZENhWmd0Y0NWSVRXSTRyMWR1cG1sRG0zM0dwYjRscHVpcWxRPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlZcDB3MThYZC9Mb3dEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpNMU1UTXdOakFlCkZ3MHlOakEwTVRZeE5EVTFNRFZhRncweU9EQTJNVFF4TkRVMU1EWmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WXpOVEV6TURZd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFET2h1VE51TnJnTWd3aHpjMGZ6YmxCa2hZRnZkTVJXN25ICndvV2t6R2dyVE05WEtNRGZxeWhOanh6Z00vMXB4OFI4c3ZyUDdIQksvVnJrbk9PMHUySXhkRDJXNUcwNmRmVzIKcjBCTWkyRXM3Zlg3YTgrN0JwVjZUVGJ5TVdZVk1LZXgwd1hJU0ZqUytBRnFaUENaaDNaL2hSZEFWR245RzJMOQpxT283N3FPeUtzbzNLYWhvQ0FPRlE5OFU3bUVvbVljQ3pPc3dUbm9NMWFIWmprOWhuYWxKdUpCU2dqTmZOdUVuCmVVa2k3azk3MnFNUmNraytJRFhYaWJWUHBPTmVLalNPNitBeWVSMFhjYzRPRWtHM0VObmoxSHVNRk9HQTZUb1IKWmJmRi9EVFV1eUswNFE0YzdFZzVGZzQ1amtrZWJxWmt5K1hTNXZTRGkwTVNIeUUrU0pJOUFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCU3RQNmlxCmhxbWpDY3kzOS9SR3hHbVIzQ2l5RERBZkJnTlZIU01FR0RBV2dCU3RQNmlxaHFtakNjeTM5L1JHeEdtUjNDaXkKRERBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQW5EallYODU0WWJycEdaeHNWNXB2Y0hLcE44RUdkR0I0cjR4ZQpWWThLamRiSUkxTXo1bStrdnRDdHVqWGdPZ2c0aHZvZWxqMC9aQ3VqSmVRWTJxWVJZOFRwZktXdUI3b1RzOTZBCjU0R3c5SVNLUWIrNUFLNjJlQTZmUU1XamlrRVl3RXNSOVpkQ2dxTjdiaWE1Z0VOckZHbVlJT1EyeGtUR1k2WGcKYzZucU1WRlNCYTJOOU5qWC8wcnJvRzd5VVkvOFpWc1VTd2ZwSDREbllJb0xOazlaQnJsSFU3RHgzNzlCbzNOVgpnK3BiUXpRTVlFeE9zUUNkNjBvc3hnWGdHT05BTTFESzJVcG5ldXZWUUJ6WUZtUHJWZ3dpYUhoaTQvVjZTelU2CmpNcTMxQ2tXTFl0VFhKcW1vSkVLUzVRN2UrVzg2QUZvV1Z5blk5WFVlUnJEY2oyVXZ3PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T14:55:11Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 6b966000-3925-4099-9592-1d0a32ad51c6 service.beta.openshift.io/expiry: "2028-04-15T14:55:11Z" creationTimestamp: "2026-04-16T14:55:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"6b966000-3925-4099-9592-1d0a32ad51c6"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T14:55:12Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 6b966000-3925-4099-9592-1d0a32ad51c6 resourceVersion: "7780" uid: 75d693dd-9046-45bd-ad76-d95bfb29e119 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-16T14:48:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T14:48:55Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "2089" uid: 406ed001-645a-43ca-8469-c756b202973e type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-16T14:48:51Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-16T14:48:51Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1780" uid: 0e7072ea-b874-47e1-86df-97412ba1eea2 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-16T14:49:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"28d2dc29-dcbe-4b3a-a889-c92a7fc3cfa0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:29Z" name: node-ca-dockercfg-t8kzr namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 28d2dc29-dcbe-4b3a-a889-c92a7fc3cfa0 resourceVersion: "37918" uid: ed72f5ba-4945-4c14-ae79-b7986ede5a0a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-16T14:49:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d2caef3d-ef49-4e04-9508-73f4fc3ba07a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:29Z" name: pruner-dockercfg-qkmzg namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: d2caef3d-ef49-4e04-9508-73f4fc3ba07a resourceVersion: "37899" uid: c12578ef-30fd-4bf2-8c49-1bb26c185549 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-16T14:49:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ae952b6c-df31-4387-a065-9496f3d36a93"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:29Z" name: registry-dockercfg-q9vr8 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: ae952b6c-df31-4387-a065-9496f3d36a93 resourceVersion: "37914" uid: 3d01e81a-6805-4ab3-99be-f28b9951b0d6 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "38894"