--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T14:49:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d5c37808-6da8-4cf8-b5d9-5a9c2eba45f7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:49:37Z" name: builder-dockercfg-kpbx2 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: d5c37808-6da8-4cf8-b5d9-5a9c2eba45f7 resourceVersion: "4350" uid: 81ab3cea-926f-4589-b0bb-45391fd62e0d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-16T14:49:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7fcc2011-c8bf-4329-a6ab-7f33cc2f0eb6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:49:31Z" name: cluster-image-registry-operator-dockercfg-xqzhl namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 7fcc2011-c8bf-4329-a6ab-7f33cc2f0eb6 resourceVersion: "3730" uid: 4842e4b3-2795-4a78-b994-3d0e8eda26fc type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T14:49:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1e62b4e2-ce76-4cf3-8136-9f3dccc40fbc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:49:31Z" name: default-dockercfg-mp7wz namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 1e62b4e2-ce76-4cf3-8136-9f3dccc40fbc resourceVersion: "3732" uid: 9eefe3f1-793b-405e-9011-37771ae2d553 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T14:49:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"44af4bce-2a4a-496a-a002-6477419c099a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:49:37Z" name: deployer-dockercfg-s9l2n namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 44af4bce-2a4a-496a-a002-6477419c099a resourceVersion: "4344" uid: 835a2a98-c8ec-4cae-9dec-498ca31d937a type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:1bffcf1e8c9a4a08258f0858a0645c16638414ce5979caca4791992bb1b5f83b creationTimestamp: "2026-04-16T14:49:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T14:49:01Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "2596" uid: b1b63042-032f-46ad-8c6a-e718676c8d5b type: Opaque - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVFVENDQXZtZ0F3SUJBZ0lJUG1XT3o0cmI3cTR3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qTTFNVEk0TWpBZQpGdzB5TmpBME1UWXhORFUwTkRoYUZ3MHlPREEwTVRVeE5EVTBORGxhTURZeE5EQXlCZ05WQkFNVEsybHRZV2RsCkxYSmxaMmx6ZEhKNUxtOXdaVzV6YUdsbWRDMXBiV0ZuWlMxeVpXZHBjM1J5ZVM1emRtTXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRQ3R3enNLTTZFU2dkSWNkYmFMODQrdDBXbFZ0NklUVHZxeApndlhOTk1qNFdWVkxvdDdKY3JIaVFtbmhOSDVKYWxOdm15VDc3eTNRcUVoVFVmVGVOZWNWdS9zc3hhMUpZNGJLCklvNkZIcVhBVEsxUDhQVUlydis4T1B4VDA3UG9hT1VIR1MwWnYxb1lWTnRvL3NsalY4NHZXbnFOSWJzV25oRC8KeUxCc3RqVHh2WlI5UWJwWEpZcGkvYmVMNGNlallpZmVtbjVuM09ObXdvbnBadG9wVmJ3STd1RGxaZTAxZXUvbgpFaUxTZ3VaN1RGam5Ra2FoRDV3a0E0VEhOd1V3b0RUUWxGOWxWUEF1Nmh4c0doWm1tTzhRWGplTEluV21oOXNOCnZKa01jWG5LOEtOek1FY2RmLzhXeEVaUFI3YVgrOGNGQUpjeEJNQURPV0hxWGdOVGVONVhBZ01CQUFHamdnRWgKTUlJQkhUQU9CZ05WSFE4QkFmOEVCQU1DQmFBd0V3WURWUjBsQkF3d0NnWUlLd1lCQlFVSEF3RXdEQVlEVlIwVApBUUgvQkFJd0FEQWRCZ05WSFE0RUZnUVVaYnZpMFVwU0hUZnoxSnNWMTZ0YzdJLy91QjR3SHdZRFZSMGpCQmd3CkZvQVVId1hsQUVYczV5TmlWQm40VTBiNmR5ODF5and3Y1FZRFZSMFJCR293YUlJcmFXMWhaMlV0Y21WbmFYTjAKY25rdWIzQmxibk5vYVdaMExXbHRZV2RsTFhKbFoybHpkSEo1TG5OMlk0STVhVzFoWjJVdGNtVm5hWE4wY25rdQpiM0JsYm5Ob2FXWjBMV2x0WVdkbExYSmxaMmx6ZEhKNUxuTjJZeTVqYkhWemRHVnlMbXh2WTJGc01EVUdDeXNHCkFRUUJrZ2dSWkFJQkJDWVRKRFl4WlRVME5HSTBMVE5tWWpZdE5EVTRPQzFoWlRnNUxUUXhOR1UxWkdOalpqSTEKTWpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQUNhUHFmbHFtRE9NSGd5MVpqRHlnK0hPOXF6Mk16MWphOUxoVQp5ejBvVG5JUkpMYU9WM0pIbFpCRUVjbXdTZWF2TVhTRnZPQ3FpTWQ1L2wxdFRvRWFHaHljbUlOalh1Y0Y1Z1NHCmQyL0JZbEtEUVFoNWxnNGdMTUhRQzhmMlltQ25MSVhybFF6akJiVWE4U0wvUHpwbW0zQ2ZPa2VGVUUrS3dlVm0KNnJNLzlGOXlKNGtqZ2ZFRmg2V2tvOVVacmRaZ1dPK2pZTUhxWkdFdUhVemxhNFFVZFZMR0ZqTkJKaHprZFBTOAp1YkdxVlpvS3hTOUVEbTFDRDYrb2NLOHByZkpxdTJwT0xWaWxvOTExQTZZd2o3YWVaMlhRTWNycS84Wkh4OTBDCi9GMDFGandOY1hSUlgzUFllMjhVUDIyNGQyYk0rNkRvVVNjb0xNbGhQYU5CRGhmVDJ3PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlYM21CQ3FQTUhBY3dEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpNMU1USTRNakFlCkZ3MHlOakEwTVRZeE5EVTBOREphRncweU9EQTJNVFF4TkRVME5ETmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WXpOVEV5T0RJd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFDMWZTZyt3M0VUT29JaE1nRmdDR3VhK2ZkRGFwUmtzeGNGClBWWFpkRTN3U1Rna2ExZFRPQVFNTVpscWJHb21sc0ZWb2IvdHVCbTh6QVFWNGhyWVBZSE4yMDdkTkxhNm9taHIKVlVqcGdhOXZsQUJJMHZPR2NEWm9WOEc1Y0I4WmIxZUhlSG5FcnpqY0JWWnRVeWpMQTZpQnVlZ3NsSjFJTTFzVApWN0E4MnMzdVQ0TTZrWVJwalp1eGJHcEtjbHRXVThhODFXUEovOVhOeUYyREc0NWVsNFVpckhzUHhoL0o2NmdmCkVzZG5ZcEM0M2xmdVk4ODh0eFE4MVNyVGlSc2s4VHBhYXB6emJzak1hTFV5Z2Mvak9vejEweDdHN2lJdHBldXEKYXpEU0VhZE9UdktIbk9FZFdPNE5IclRwUzdXcUE4RG12QWd2MWROZ2V5ODlTaG85ZFowUEFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUWZCZVVBClJlem5JMkpVR2ZoVFJ2cDNMelhLUERBZkJnTlZIU01FR0RBV2dCUWZCZVVBUmV6bkkySlVHZmhUUnZwM0x6WEsKUERBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVZRK2tGT0g5R1JsWWpweGV1OUpZL3NFUE40aTg5M2ZRV3BoVQpxa0J1T2cvaVB1SWtLZmt6QlZYVFVKbW1DK0poZUk5dTNsQU44Q3FjQ0hKZEkyRmdQMHFqajJ0UHQ1eGlJdjBhCkc4SlMzVHVua0p1dG9lWlM5M2dHbFF3cjlpbkYwR3dVU2xiYUgvNHh3L0doTnlFeU82aU5QejZsaWN1NUtnSW4KZHp4cnFJekVtU1dTNXlXUnNMeEFEOEtNQ3hkaGo3OEV1UytVWWFXVFlxdEpFQVprNDFYNXJYbUtIRFp4akh6dwpVcmFqQXJPTEttSXY3TllwM0UxSUpwTEc4VG92V2djUldaUkwvSGtvQWo2VXZHZ2wxczlmWjYxUmlud1ZlR1ZkClZwaktUNDZQblduWkV3QWJ5eVlaSWp3ekY5cUJjdWpkUXozSzRRa2hzMlN2ZWhiM3F3PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T14:54:49Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 61e544b4-3fb6-4588-ae89-414e5dccf252 service.beta.openshift.io/expiry: "2028-04-15T14:54:49Z" creationTimestamp: "2026-04-16T14:54:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"61e544b4-3fb6-4588-ae89-414e5dccf252"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T14:54:50Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 61e544b4-3fb6-4588-ae89-414e5dccf252 resourceVersion: "7742" uid: 9eba4d15-59a0-4320-886a-da8aaa8962e0 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-16T14:49:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T14:49:01Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "2595" uid: b702fff0-86a7-4b21-ac1c-9f0d66dfb6fc type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-16T14:48:30Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-16T14:48:30Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1722" uid: 45720e01-9a05-4dcf-924a-c0ec0a053435 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-16T14:49:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a4e2b456-05e0-451d-9caa-4dfe9aff0ef7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:49:31Z" name: node-ca-dockercfg-847j8 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: a4e2b456-05e0-451d-9caa-4dfe9aff0ef7 resourceVersion: "3737" uid: bccf0205-ae13-4b4c-9bdd-cc5695e3a0f4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-16T14:49:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7fa71f9c-a4e3-463f-8801-f973dfcb16bd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:49:31Z" name: pruner-dockercfg-jt65w namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 7fa71f9c-a4e3-463f-8801-f973dfcb16bd resourceVersion: "3742" uid: c5b9a7de-fa11-4d21-829d-eba6d314be0f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-16T14:49:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"954d4d0f-789b-4fed-8370-f878ebbf2530"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:49:31Z" name: registry-dockercfg-gptk5 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 954d4d0f-789b-4fed-8370-f878ebbf2530 resourceVersion: "3745" uid: cb9569c9-0cb8-43ce-a826-f61428f6e8cc type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21473"