--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T11:12:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bff27a0b-3d62-4001-9e43-8d600ec1a383"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:12:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:12:38Z" name: builder-dockercfg-9jvtn namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: bff27a0b-3d62-4001-9e43-8d600ec1a383 resourceVersion: "3390" uid: 95584916-4553-40e1-b7dd-0e0eca3ba833 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-17T11:12:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:12:33Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8f92cf5c-b419-4e7f-b6ae-a506d22d7edc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:12:33Z" name: cluster-image-registry-operator-dockercfg-mkmwq namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 8f92cf5c-b419-4e7f-b6ae-a506d22d7edc resourceVersion: "2811" uid: 3862529b-be31-40fa-bd79-156604ca8884 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T11:12:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:12:33Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"eee75abc-c073-4e4a-991b-28eee2669748"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:12:33Z" name: default-dockercfg-62zph namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: eee75abc-c073-4e4a-991b-28eee2669748 resourceVersion: "2820" uid: 9d11806a-aa92-4d92-8e4e-fb2fa6c0274d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T11:12:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8e21088d-7181-4c44-8439-2ae12fdb4b33"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:12:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:12:38Z" name: deployer-dockercfg-7cgxr namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 8e21088d-7181-4c44-8439-2ae12fdb4b33 resourceVersion: "3386" uid: 6e623d14-b5c5-40a2-9373-b6d1ebc17f0c type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:14be1dc9a1b2f86a256f8fd1460dbb628b5bddfc7cd1d6f1bdf07dfd4ad96bc3 creationTimestamp: "2026-04-17T11:12:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T11:12:09Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1987" uid: 5d20feb9-57b6-4d7d-9f8c-170cd42e11cc type: Opaque - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVFVENDQXZtZ0F3SUJBZ0lJZHFjenJjc3kvdzh3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qUXlORGN4TXpBZQpGdzB5TmpBME1UY3hNVEU0TXpsYUZ3MHlPREEwTVRZeE1URTROREJhTURZeE5EQXlCZ05WQkFNVEsybHRZV2RsCkxYSmxaMmx6ZEhKNUxtOXdaVzV6YUdsbWRDMXBiV0ZuWlMxeVpXZHBjM1J5ZVM1emRtTXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRQzd4dzVrY3R0T0QrL0R6MHpvYmYyd3pSQW1jcWF2Sk8xWgpENXRvTXB2TFN3MXE0T0hhcXQrR1FuS1A5dy82d3BNVmhrdWFnYzhBaWw2bTVnUE9qeXA3dUdaZXhOMDhXVUVHCkQvNndRSzAvSnJ1a29qWGcreTR6UVFyUHVWZFRzanQ2L1VUWlY0d2ppVldpNUZmbTZFa0Q5NFpBMkJwQUo5SDQKVlVpVFVxMWhYOTBOTGZmaE5UaWY5bFZUM3RJNlVVZEFZZzUyam1qaFViRExCNnZsOG1QQWhDTUNDaVVpMU9qRAphL1pSeGZtL1g4Qml2QVdQUW1oRW0ySnREdlVGZjRYS0ZPeW95eWNtVXBtUHVNQkVLdGtoTDhNOU04bm9HbUxMClJZSjFRdzdkcWlJVHp6elZUek00cTdKNzdCS0dLYzB3bm02QlZNRHZlUlhPcTYrc0MvdFZBZ01CQUFHamdnRWgKTUlJQkhUQU9CZ05WSFE4QkFmOEVCQU1DQmFBd0V3WURWUjBsQkF3d0NnWUlLd1lCQlFVSEF3RXdEQVlEVlIwVApBUUgvQkFJd0FEQWRCZ05WSFE0RUZnUVVvT3FLaWRMM2dKWHVtL2F5Q3VVT1R3NnRpYlV3SHdZRFZSMGpCQmd3CkZvQVV6bGlYb2lVYkh6VElka2c1N2JoSWlBMk54WXd3Y1FZRFZSMFJCR293YUlJcmFXMWhaMlV0Y21WbmFYTjAKY25rdWIzQmxibk5vYVdaMExXbHRZV2RsTFhKbFoybHpkSEo1TG5OMlk0STVhVzFoWjJVdGNtVm5hWE4wY25rdQpiM0JsYm5Ob2FXWjBMV2x0WVdkbExYSmxaMmx6ZEhKNUxuTjJZeTVqYkhWemRHVnlMbXh2WTJGc01EVUdDeXNHCkFRUUJrZ2dSWkFJQkJDWVRKR1JpWVRsa01XTXhMVGd6TlRrdE5EZ3hNUzA0TnpWaExURm1NVFUxWVRCbVpHVXoKWWpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQXRCQnZrRm16c0JPMWp2ZU1PdlBOZTh2S2x0U2NHTTNWNlJYWgozTUVuWUMyaFF1YmpEK3lqVE94SFVGeXh4UTZybFVYaE0vZlNZQ1psMmp2b1d6RVVRTEVGZkFnVXhTMld1NGZlCkRtM0h0eldvQUVpRjl6UkhvT0QybTlPemFmRis1OVJ6QmFnZ1BZRDMyajdUOThkYlBIeGF4U3ZXYkx1RkpOcjQKdWh3a1h1RlRaSURGM2VadFdOR0YzdUtac01IT29qVHRpdFNzVnEyYzg2bHBxVjlYemZjeDIzaXlZZXB1NVNoMgo0QjkxcjJjMUVTeHh1KzIrZ2lFVWhORHlBZkhjaEZ5MnQ1cVFjYjI1MHM5UWF3U2d4TW9wOFhnanNSLzNFUEVhClc3VFVycUNEU1A2QnJ3Qy93YTlHS1ZXemZpUm5rNnRZTzRTNklRMlBpUUlzZVVoZndnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlRSE9UWlZwNnNyQXdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpReU5EY3hNekFlCkZ3MHlOakEwTVRjeE1URTRNek5hRncweU9EQTJNVFV4TVRFNE16UmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTBNalEzTVRNd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFEZ1hnQm9ydFJZUmp2QmIwTnpsZERJQlNYZ2pTblByM0J5Cmk5OVpWVXgvR0dWcithNkkzcnRQVUNzM3ViSFhTNmlQU1VlMGVYY3BTaTcrMXlDajVjazdoc3dmS1ZWMGNGU0wKM0xneGlnOEJiUE5tSW15MFovWjNTMmNGWjlJRmtPajg5QkRWSFdGT1VNN1FDL0gxbkNyWjRBVlpJZ2hjbU5CKwpkWTROT24xaWJhYXlxaW1JOTl6VFh2RXRuVGJMcHJUSHdLU3kyMnRpTE9DWk9oUVFSQ1V6a2F4d2ljV084SDF2ClV6aHFIZmU0eXlvOUY1V1oyK1loRUJNSld0aUhmWTJWYWZlMXptZHg2VzBiSzFuWWVtWFJvZnV4V0xEWDE5S2wKVHU4d0tFZmRWSDY4QlhBS0JTWjJ4TUlzemJyR3dmbU1rYlNMSDNEWHZLSUdXd3VBTVVWTkFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCVE9XSmVpCkpSc2ZOTWgyU0RudHVFaUlEWTNGakRBZkJnTlZIU01FR0RBV2dCVE9XSmVpSlJzZk5NaDJTRG50dUVpSURZM0YKakRBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVRHVWNRQ2swVWlVRE53OWN6cSs1dWNrbDVLU0l0THFpajZWLwp0ZkpiMEJMdnlzM0NtM0M1d1YxeWFteUtGdnJsd0tIWStWdTJpTSs5M3AxZUgvSWZaV3VxcXlrdkc1RXpBc1RNCm9ZMkpnZVpNRDM1TVY5SlJYSFlUL0p1ODhpS1lrSnBGbTlVbTFsekpxZm4zSk9iTCttWncrcEx4YVBuaDJWMFYKTUtudWViUktUWEVCTlJOVStQZVBIRk9hdWFjWnNla2NkZ2JBYno2MkNPeWhjUEc2cjd2VDZaa0hEaTd5eDU3ZQpWb1h4MGJGNUpqbWhjNzJFZmZ0YUdkVW54MHNXd0l3Y0FEMHhaM0tlakZpeFYwZ3FUUkYvSndWSkdHQWNPUG5YClpjaW5KN0szY3I0aFpvc0t0RFBUdkU0K0FuODJhV2htMVRodVZqOHRVZXd1SVFLTytRPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T11:18:40Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: dba9d1c1-8359-4811-875a-1f155a0fde3b service.beta.openshift.io/expiry: "2028-04-16T11:18:40Z" creationTimestamp: "2026-04-17T11:18:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"dba9d1c1-8359-4811-875a-1f155a0fde3b"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T11:18:41Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: dba9d1c1-8359-4811-875a-1f155a0fde3b resourceVersion: "7840" uid: c51eed04-0702-424f-b15b-faf4ac43a29d type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-17T11:12:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T11:12:09Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1986" uid: 396002ad-8b39-4f1a-b761-76aa75b05561 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-17T11:12:05Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-17T11:12:05Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1852" uid: 78d977b2-cbf6-4420-bbcf-c301237d2ed2 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-17T11:12:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:12:33Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8c8e3a59-4503-4eff-b895-9d1de108b1c8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:12:33Z" name: node-ca-dockercfg-9sgx7 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 8c8e3a59-4503-4eff-b895-9d1de108b1c8 resourceVersion: "2835" uid: f0d6c145-1212-4714-833d-8207e507dcfd type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-17T11:12:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:12:33Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"58b0d3fa-c038-4b4d-aecb-8e8672e13c9c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:12:33Z" name: pruner-dockercfg-fjwkg namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 58b0d3fa-c038-4b4d-aecb-8e8672e13c9c resourceVersion: "2828" uid: d5cb6b6c-ecf2-4639-86b9-4ed822399c93 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-17T11:12:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:12:33Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b0a01e98-21db-4531-bff6-d7604f365213"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:12:33Z" name: registry-dockercfg-l4t4t namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: b0a01e98-21db-4531-bff6-d7604f365213 resourceVersion: "2836" uid: b38000a5-d93f-4924-aee5-1381f9231ac1 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "14064"