--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T20:02:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:02:57Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"eb9f6a5b-40b4-40b6-9525-365cac6c302f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:02:57Z" name: builder-dockercfg-6bht2 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: eb9f6a5b-40b4-40b6-9525-365cac6c302f resourceVersion: "4153" uid: 546a1822-1329-4488-8f07-0b35f1f2a187 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-20T20:02:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:02:51Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"da89f2b6-fdaf-4bae-8320-1b36774cf7c0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:02:51Z" name: cluster-image-registry-operator-dockercfg-tdng5 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: da89f2b6-fdaf-4bae-8320-1b36774cf7c0 resourceVersion: "3561" uid: 5d10948a-cbdb-4128-a433-30599a86fb70 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T20:02:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:02:51Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d20580b0-c900-4dc3-9ba7-ea272ad48931"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:02:51Z" name: default-dockercfg-rtf84 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: d20580b0-c900-4dc3-9ba7-ea272ad48931 resourceVersion: "3562" uid: b37fc806-8fe6-424f-8730-1caf8b9e766a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T20:02:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"642c4574-d70c-475f-85d7-40e8b370eda5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:02:56Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:02:57Z" name: deployer-dockercfg-xh6x5 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 642c4574-d70c-475f-85d7-40e8b370eda5 resourceVersion: "4144" uid: 61cd3517-0016-413a-ad1e-f6866cb16fe3 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:e454f9579b9d6d546c381f3033243c5f927ea00a05323dc79c13424e88f8929c creationTimestamp: "2026-04-20T20:02:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-20T20:02:10Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "2047" uid: 46de615c-8364-4e9a-94d3-50dfbb713a37 type: Opaque - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVFVENDQXZtZ0F3SUJBZ0lJQXdOQWh5WkZqOE13RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qY3hOVFk1TmpBZQpGdzB5TmpBME1qQXlNREE0TWpGYUZ3MHlPREEwTVRreU1EQTRNakphTURZeE5EQXlCZ05WQkFNVEsybHRZV2RsCkxYSmxaMmx6ZEhKNUxtOXdaVzV6YUdsbWRDMXBiV0ZuWlMxeVpXZHBjM1J5ZVM1emRtTXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRQzYyTVRZbmJoNXgyZ1doWnFVNnozQW9MR3pYSG5HTFZNNQpmaWtYclZGVFVMZ0NJbHN0VUZ1U0MzSm0yOXNvTzhkWi9oa056WkFGWGQ0bGd2dGZlRFVJSE0wdDltb2JFT3FjCkVGaVg2QW9rVXVFU1RMNTNDOHk4WCtzY1h1UUdBN2xmYmUvQUxZekpOQkZaZVhTVjVOWTFMNHJ6QTcwZ0dvY0YKWW9Ea1NFSXFHbjBlUlFoazF6d01qSTJJSEQrQ1ZHNHVORm1CVHhFM1R5eVhoS0VZcjIraFdmV1BUWjd0VTNoSQptWEVpbnJwdng2YkswazQ3ZkIvWkdwQ1pKbDk5S3R4V05HcDVDMnlkTjI4cXZaZktFWjVaemZsNzRnZnRzVHZsCjFDZ1E4U1hxNUhxQlF1cmt4bU9jdUEzUDBoOXEzbHRjV2F6UjYyZko4dWtBSWlHa3J4Z0JBZ01CQUFHamdnRWgKTUlJQkhUQU9CZ05WSFE4QkFmOEVCQU1DQmFBd0V3WURWUjBsQkF3d0NnWUlLd1lCQlFVSEF3RXdEQVlEVlIwVApBUUgvQkFJd0FEQWRCZ05WSFE0RUZnUVVCSDBWNWt5TmQ5KzZmVTVtay9EdVByRWI3R0F3SHdZRFZSMGpCQmd3CkZvQVU0OEhDUWYvZDAwT0kwZWk4am9LSWhWdnphb0V3Y1FZRFZSMFJCR293YUlJcmFXMWhaMlV0Y21WbmFYTjAKY25rdWIzQmxibk5vYVdaMExXbHRZV2RsTFhKbFoybHpkSEo1TG5OMlk0STVhVzFoWjJVdGNtVm5hWE4wY25rdQpiM0JsYm5Ob2FXWjBMV2x0WVdkbExYSmxaMmx6ZEhKNUxuTjJZeTVqYkhWemRHVnlMbXh2WTJGc01EVUdDeXNHCkFRUUJrZ2dSWkFJQkJDWVRKRGN4WkRneFlqaGxMVFk1TTJRdE5EVmhaaTA0WWpVNExUZGlObUZsTUdSbE1UQXoKWkRBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVdqSXdHNE1UZW9NVnFoaUUzdnErYzc4YVpxY3UzZXQyQThPVwpYbm5PejNQdEdSSmlLN0xoWEVWSU9hT0VxcVhyQktGSlpJNXVYenhmNzRZMnQrN0ltcWROaU1lRTNWVGNNei9CCnVNK1lnZVlpa0R3cTBxWWREL2xGcGlvTUI5NUh1V1Q4eitncUtkZElCdktWQ21QN29FeHFiWElveUU0Tnl6dHUKYWRkb05wUXA1aXZVcDBXa3U3cVBFdW8vNDdRc050M2c0RjdZcnJoOUt4SVArYWcra0I3SDdJaUpUbTBPYUUxVwpvYmtOME5VVHVpdmY4bU1MQVNVSXo1WUtQaW5BQ0xDV2tJYmZ1SXFGOEdMaUl6QlRrbW5BaUdPTy83UkFPbnloClIzWk1QWTJnKzc1amRwY2lSQnN0UU1nL3IwK0dJNlovU3grNWUrbUZtcGgrVHZnUGJRPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlOM2ZpZGE1Q01Jc3dEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpjeE5UWTVOakFlCkZ3MHlOakEwTWpBeU1EQTRNVFphRncweU9EQTJNVGd5TURBNE1UZGFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTNNVFUyT1RZd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFETC8xTlY1Q0JhTFM1SmVVendoQzRkZzIwYnQvS1FMMWRICmhJck1OTTd1TFU0YUtkcWNadHBTb0tTdERkVHpraFgweHV5VTI0NE5GNXRkNE1idlB4WityYW52b01OVlNGMWwKRVhoT1NVczV3eFRBcitkNzNnNlFmcXJxbTRqZFFmWmpqazBnQmZjY3FaZ2ZBemhuNHh6Tno5elpKRHl0RmtZcQplcWZUNlBVSEtLTFl0NnZVNE50a21ZeERiR0FUblNsbERoTzlSUVBVYUcyMDhEa0dBUmY0SmZXR1ZZZlYwZGJJCnk0TmxEZGg0VEhTN0ZuVnpFZHhxZUl2U1BKN3BRWWp3SXA4cXRhZVNEeFBta20wWWdoLzNDZUlrRzVJVmF6V2kKNTFabUE4VndJVTdmRnhPWmdQQjFQSS9vcmFpUDJKQ0xvdWRhWUZWTHhmTXRtK2grakd1N0FnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCVGp3Y0pCCi85M1RRNGpSNkx5T2dvaUZXL05xZ1RBZkJnTlZIU01FR0RBV2dCVGp3Y0pCLzkzVFE0alI2THlPZ29pRlcvTnEKZ1RBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVF5aUFXalJhSzZIZzdGM2dQemZOME5XZHlPTUNLQURROWZLYwp0TWpmZThmaXdsNXZQZmxXeWlsYnRTdm9UdTREdFJCdXcvN01uVEsxVzRxZWRacjlXazRQMmQ4SytscXNBdXRLCkNraGltaEliT3JLVjVULzdtK200Y3RLTFFweWIxZUhvUGNObjVOUGZjTTFmb0FJQlNlbEdKT1VSV1BwckNRTG0KeUZGMFdZS3FzQmFNbDlMYnpsbnNKbDhmL254YlgrTkpRbHJYTkRCYWZrT0RPclE0OGdDU0lwVWVUK0crcHV2UQpRbU1rK0hOSk1MZUpld1RYSTRnTmdWS21WRHBTNEJMaEtKZ2JsNDZ2aE9udjh5Uk1ZYXJoMlk1T0tqWkVkckM0CmhOOUpUQVROajA5Y3A4ZlZURmp3VCthb2pJa1I0aU5uc3NwQ1hFdVNjQXl2d3VyRVZnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T20:08:22Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 71d81b8e-693d-45af-8b58-7b6ae0de103d service.beta.openshift.io/expiry: "2028-04-19T20:08:22Z" creationTimestamp: "2026-04-20T20:08:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"71d81b8e-693d-45af-8b58-7b6ae0de103d"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T20:08:23Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 71d81b8e-693d-45af-8b58-7b6ae0de103d resourceVersion: "7710" uid: d008db2d-31d7-4dac-b102-b770c33ee657 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-20T20:02:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-20T20:02:10Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "2044" uid: 38369f51-4a49-4711-b1ca-4985276d9624 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-20T20:02:07Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-20T20:02:07Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1794" uid: 7de97e74-11f7-4fec-9a2e-a2342d93b6eb type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-20T20:02:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:02:51Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"feb33128-3def-4746-9e43-0239081dbb8c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:02:51Z" name: node-ca-dockercfg-tpnm4 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: feb33128-3def-4746-9e43-0239081dbb8c resourceVersion: "3563" uid: 775f5ae4-f13e-4054-8848-9ac1ecaf7de3 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-20T20:02:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:02:51Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"df4ababc-2688-4e76-b44a-3865c31b600c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:02:51Z" name: pruner-dockercfg-gzj6g namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: df4ababc-2688-4e76-b44a-3865c31b600c resourceVersion: "3571" uid: 87da3025-b47c-43b8-a0e9-138bf7fcf18e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-20T20:02:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:02:51Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b8a5424b-940c-4e7b-9f12-081c04d870a3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:02:51Z" name: registry-dockercfg-dkw75 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: b8a5424b-940c-4e7b-9f12-081c04d870a3 resourceVersion: "3572" uid: 7125801b-2bf2-4612-abf1-37fba5433a0f type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "20959"