--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T17:21:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:21:33Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0ff0ba4a-0ac6-43f2-bec7-f2ff275b0777"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:21:33Z" name: builder-dockercfg-7mks4 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 0ff0ba4a-0ac6-43f2-bec7-f2ff275b0777 resourceVersion: "3679" uid: 3ff20144-3223-459d-be63-ba8c6904dce1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-17T17:21:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ebb536d8-14cd-4ac1-bf7a-06627a578dc7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:21:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:21:28Z" name: cluster-image-registry-operator-dockercfg-8rp9f namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: ebb536d8-14cd-4ac1-bf7a-06627a578dc7 resourceVersion: "3009" uid: 7010258a-1959-4c1e-ac62-44666321fb5b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T17:21:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a00e600c-0303-43fb-9992-6d330d46fb31"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:21:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:21:28Z" name: default-dockercfg-96jcq namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: a00e600c-0303-43fb-9992-6d330d46fb31 resourceVersion: "3012" uid: 0143e895-0f95-4382-93ff-8e72b9fac80d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T17:21:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:21:33Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d9646b4e-1945-43a4-bea1-03adf40b46cb"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:21:33Z" name: deployer-dockercfg-6lb7w namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: d9646b4e-1945-43a4-bea1-03adf40b46cb resourceVersion: "3676" uid: 51d04d5c-ca5c-4521-9a3a-6e537cd80049 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:8f26c6893eb16907fb504ee95dadd810919d07765c42aa5ce33f0c3a0f5c7ae0 creationTimestamp: "2026-04-17T17:21:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T17:21:04Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1984" uid: 4b487345-4f88-447b-88d4-1bb47051d183 type: Opaque - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVFVENDQXZtZ0F3SUJBZ0lJWGxFdTZ0L20vMVF3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qUTBOamd6TlRBZQpGdzB5TmpBME1UY3hOekkzTWpGYUZ3MHlPREEwTVRZeE56STNNakphTURZeE5EQXlCZ05WQkFNVEsybHRZV2RsCkxYSmxaMmx6ZEhKNUxtOXdaVzV6YUdsbWRDMXBiV0ZuWlMxeVpXZHBjM1J5ZVM1emRtTXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRRHg4aDIwUWV3OVZ6aDVLbFhhMjRwZWl5M3FlVVNBYlhqRwpNL2Y4cUcrcnpRYjZVTnhWMHVmVFVteW9Da2FaODg3c1RCNERVZ1BMSXIwa2J5ZktNc2lGQzQxendjT1lvVTU2CnlkYndKazFUaVlUVHJWMExiMk80R3Z6R0lxT0MwUGZmbklUYm1RdXAyUFFabmpONHpJZFN5Q2hZT2dEMUZwQ28KUUo1Q3ltbGJPQXNGZTAzZ0p2WkJpVFIwTGJCYWtGWHdSZkUyamhXZnN0VXB4eEwzMWd1ZUVOTWsrNkg3T1FpagowR3hhSGlod0ZEWUFRL04yblJ2dHNsaDdIcjU0RXlFT0lhcW9RNnQvby9BSWpoOVNPeCtodGdsMEZFdkYrRmJxClhObGY5NzFIa3BGWkh1bDduYi9iYzIzTkdyTlZqbW9aV2RsK0NoRmwwVGRiOXAwc2J6OEhBZ01CQUFHamdnRWgKTUlJQkhUQU9CZ05WSFE4QkFmOEVCQU1DQmFBd0V3WURWUjBsQkF3d0NnWUlLd1lCQlFVSEF3RXdEQVlEVlIwVApBUUgvQkFJd0FEQWRCZ05WSFE0RUZnUVVockhSYWJ3M1pSUm1RVjh2MW92YTVGWjNJbGd3SHdZRFZSMGpCQmd3CkZvQVVHWFprVkg5STJFTFdSejhuaVp1QnhzcEoxdkV3Y1FZRFZSMFJCR293YUlJcmFXMWhaMlV0Y21WbmFYTjAKY25rdWIzQmxibk5vYVdaMExXbHRZV2RsTFhKbFoybHpkSEo1TG5OMlk0STVhVzFoWjJVdGNtVm5hWE4wY25rdQpiM0JsYm5Ob2FXWjBMV2x0WVdkbExYSmxaMmx6ZEhKNUxuTjJZeTVqYkhWemRHVnlMbXh2WTJGc01EVUdDeXNHCkFRUUJrZ2dSWkFJQkJDWVRKR1JrTTJReU5EQmlMV0l5TkRBdE5HRmtPQzFpTURNM0xUQm1Nekl4TldZNU5UTTMKTVRBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWoyYTNzQVNQcFlNR1lrUCthWEVtczd4N1p1eFhVZm1ybWtLbApJd2crT1dJRVJkZUhTdmpDWlhhR3p3TkpRR2ZyTC9mTGx3R3hJN0FHamVFRjV2akVSUmlUOWVCU25xbzZHMk9tCm9mckFQVHlLbGg5SFRUQlAyU05nV1d2aHFaYnl4cEdXU0xCWDlXQmJNdzl5YzFJNTU1cmZSajU4RHhtRllSVCsKK21UZWllWGxzUVlEZVpKcXR0RW0rcC9iQU5Oa3Fad2ZyVUtYOVRrQVF4d29SOTRLMW8veis4aGpnNVVkcFp4VwpjbXRNaGlRRWNDalJLOEhzRHdLSmxYWEhGejJVSTB0cWF6dzdrdDU3QnZjWDdST283aEZRVHk4UlhiQzk4Wlk1Cm4yeVZEckk0MFoySUd5WGVKZzRDcjFBMGFIdTRmbHdKVnp4bjNQVnBiY01CMEc0aVpnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlHVm5oUWNxWUFIWXdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpRME5qZ3pOVEFlCkZ3MHlOakEwTVRjeE56STNNVFZhRncweU9EQTJNVFV4TnpJM01UWmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTBORFk0TXpVd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFEaU5WL3VGeWIreW5adUNwS0VIZmhvYU9NaXo5dy9sSksxCitYMEZFZXl2WndtdzMyWUJxVUxjNW5NOFJEZGZLc1I4R0RwZE81b3IxdmVLcE01emplbnR0Wi9UU3dDQ2VFSkcKZGpaRUhnMnFUaGpzVnVLOXNFaGNEdDJyOURJbUtRMFR0Y3JvN25FWEJpSkhBWGNJbWx1WC94bXVRclhPZlZxTwpJbWRPWjRDSVh1MzBKRXl6cjFralpXTHExM2xmblpWVlN6RlplZ2FIOFV2TTBXdHlzczZkcDBsWXo0T0luVWdFCkZiYWVzcllYMkMyT1ZsdGRzMk8xYTNSRGdVRWk0UHN5TDFORitjVlhod3pOZjdDaERNeWR4cUs2elljeTFtQU4Kd3lNa25NUUNnQllTWUxVeW1SU0RRdG9Mak8vSTYxWkt1NmtEK3dmWmZadWRoVVI4eURUbkFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUVpkbVJVCmYwallRdFpIUHllSm00SEd5a25XOFRBZkJnTlZIU01FR0RBV2dCUVpkbVJVZjBqWVF0WkhQeWVKbTRIR3lrblcKOFRBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVJENXA0WFpZMzJ5ejRNSUsrOFRqSEZLdzNKQkl3SUFEMFRtLwpkVGFkZXgva0lPcHY1ZzNxK0p3bEpsSFlTd0xNdVZ1Z2wraUV0NnZUVSthRzd6dm9lVkVINHJSeXA3QS9LcGw4CmdaRTVZSVFBM2xNaE5tV3FZdVo3VFRHSkRnYWlIOE1BdXNGUDRKNHRlUXB4cGNlRnMrZ3NLNVJlb1VtQ0w0TzQKbERFSVpiQmQrTU40Nm42UmxRMkFsTEg3cUVoZytFQlhhdUV1ODhReGtIL0czdVp5YjAxRi9uMGIwWE9UV1VlTgpxaTN0NFdtcWxIYzNqb2ErZUdmTmh4b3lOdmJ3QUU4eGVVRkJ1Nnk4MEFiUWM5RERjbnlxU0M2QXhyR2gyWVlyCkFHa2s2bUw4VUFVWFRqWUFtMXBISHk1RFlRNFROajhmY3VOdm4weXhScjI1WU4rQkt3PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T17:27:22Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: dd3d240b-b240-4ad8-b037-0f3215f95371 service.beta.openshift.io/expiry: "2028-04-16T17:27:22Z" creationTimestamp: "2026-04-17T17:27:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"dd3d240b-b240-4ad8-b037-0f3215f95371"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T17:27:23Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: dd3d240b-b240-4ad8-b037-0f3215f95371 resourceVersion: "7783" uid: c64bfd32-a05b-4b51-b2b1-0266df3ec5bc type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-17T17:21:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T17:21:04Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1983" uid: 8158d804-b500-4392-8624-764b93218a5e type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-17T17:21:00Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-17T17:21:00Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1667" uid: 26b776ad-5ee9-4be0-95ba-4f7ac3d34c50 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-17T17:21:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:21:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"05018cf0-6b17-4880-a0cf-e46e1c075eb4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:21:28Z" name: node-ca-dockercfg-7lcdx namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 05018cf0-6b17-4880-a0cf-e46e1c075eb4 resourceVersion: "3013" uid: a661abe1-e23e-495c-b4af-7502d1cb12a6 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-17T17:21:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:21:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3912fd9b-ca52-4d98-a8fa-c02a51d78e46"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:21:28Z" name: pruner-dockercfg-9jt9j namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 3912fd9b-ca52-4d98-a8fa-c02a51d78e46 resourceVersion: "3014" uid: d144f9eb-6458-4bda-99f8-9129c6ea95f8 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-17T17:21:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:21:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1b2a3a96-56c3-4659-86e0-03a2b85fe3d4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:21:28Z" name: registry-dockercfg-hlc25 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 1b2a3a96-56c3-4659-86e0-03a2b85fe3d4 resourceVersion: "3029" uid: 2a03ba02-4b62-40cc-8bfc-3c524c879d53 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21632"