--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T07:48:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0e0d8944-d11c-46e9-a694-2464980fd04c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:48:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T07:48:42Z" name: builder-dockercfg-cppsf namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 0e0d8944-d11c-46e9-a694-2464980fd04c resourceVersion: "4393" uid: 084f15b3-72b5-4221-b5e3-463860cbe880 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-17T07:48:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"841cdea7-72dc-4bcf-b984-c23e9878d978"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:48:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T07:48:41Z" name: cluster-image-registry-operator-dockercfg-77zv7 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 841cdea7-72dc-4bcf-b984-c23e9878d978 resourceVersion: "4226" uid: 1c037c08-6c2d-4407-90ba-84d501aba167 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T07:48:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1c569281-3832-4cf2-954b-1e0f172e49ca"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:48:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T07:48:41Z" name: default-dockercfg-nzxsm namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 1c569281-3832-4cf2-954b-1e0f172e49ca resourceVersion: "4224" uid: bfa74930-3566-44b1-a8a7-faa647ba1291 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T07:48:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"86fef40d-ef93-441c-8e77-aa9ea10cb5b9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:48:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T07:48:42Z" name: deployer-dockercfg-rmlfg namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 86fef40d-ef93-441c-8e77-aa9ea10cb5b9 resourceVersion: "4395" uid: 2a60377c-316e-41e3-9820-60cda5858d6c type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:4fccacfe603cea7a555c463570a800e2613fbae5133e60d7ec98f1aa1162fc27 creationTimestamp: "2026-04-17T07:48:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T07:48:40Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "4099" uid: 2babc7be-c644-4667-a816-067380b41949 type: Opaque - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVFVENDQXZtZ0F3SUJBZ0lJSnlzQ0pHRHJ0cnN3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qUXhNalEwTXpBZQpGdzB5TmpBME1UY3dOelUwTURoYUZ3MHlPREEwTVRZd056VTBNRGxhTURZeE5EQXlCZ05WQkFNVEsybHRZV2RsCkxYSmxaMmx6ZEhKNUxtOXdaVzV6YUdsbWRDMXBiV0ZuWlMxeVpXZHBjM1J5ZVM1emRtTXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRQ2lmMHJndlNDMVhrU20xVFN5c1BJNUwyZjR3cHpkR3hVaQpvQmJXM3lHdXk2WFVaeE9idGtXc3dGMVNwaTdSMk4zdzZZYkxYQ28wVUNiczhvb3VyWHEwTkg5OFdMeUlZL0NUClJabDhLUytET3h6dTNOWG10aklOSEtCU0JKMW1LMTZwa2hsaW1WU3Z6K1lFSXFpaXltaFU5b2JGWW9OSjZNd1MKTEphQnFjSGhVWXFmSkdrZTAvUk4vbXBWbWY4WUtsS2dMK0hkU29UL0VnTUNnREZnR0orUzJZbnp0dzMvTTNLeQpUQmFWaDhlS0NiYVp1b3UxazIrOE95SzFSanBIRzBMelBxeFE3U0grMW42b201SUpYMlRlbndwK3ErbmhpeE5XCkhybkUybHorTkRXRXBUd2o3TS85aUsybVlvM2w2cDZZdWQxUm5SMVo1c0djTXE2Vmo3QUJBZ01CQUFHamdnRWgKTUlJQkhUQU9CZ05WSFE4QkFmOEVCQU1DQmFBd0V3WURWUjBsQkF3d0NnWUlLd1lCQlFVSEF3RXdEQVlEVlIwVApBUUgvQkFJd0FEQWRCZ05WSFE0RUZnUVVIazRMaCs0VFJqaFp0OGJEZ0QrZ3YxRGkxZ3d3SHdZRFZSMGpCQmd3CkZvQVVIc29NakNMUmd5cnQ5N3hOSFdybUdmY2E1a0l3Y1FZRFZSMFJCR293YUlJcmFXMWhaMlV0Y21WbmFYTjAKY25rdWIzQmxibk5vYVdaMExXbHRZV2RsTFhKbFoybHpkSEo1TG5OMlk0STVhVzFoWjJVdGNtVm5hWE4wY25rdQpiM0JsYm5Ob2FXWjBMV2x0WVdkbExYSmxaMmx6ZEhKNUxuTjJZeTVqYkhWemRHVnlMbXh2WTJGc01EVUdDeXNHCkFRUUJrZ2dSWkFJQkJDWVRKR1F6WWpabU5qY3lMV1UyWm1VdE5EQXpPQzFpWTJNM0xUWmpPVEJpTm1aaVlqWXoKTVRBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQUd0VnFXUWM4d0hMdHhTRTJRcUdVRGdkOUJsMTVucWxsWEZ4bQozem1wRktUYWIxQzJhbXRhWFZKQkQvcWJMTlduRFFtZ3NqTVN0T0xsaWtVRkF1V2ZIaVhUMnNEUEttSzZQOHRlCnI2NnhXeTVUY0RsOTJRUWlGOTY3dVJMeHBDMnA2eG5pSUR5RG5rdWNkTzFZNXBaMExMRzRXSGhsTVVEdEN2VmQKNmxMZlMzcXNPOVZaSXV4ZTVKemZZaFVMSVNuNkhjSlEzRC9CZVB5eEIvcUhOcDNsWDJSOFdXS3JMQmhmaXo2eQpLeHJacVh6L2pNQTREZk5tendsOTRHSU9YMnY2N1hHUWN2bGsvcHd6aWR6VGE1NU1KbDhNK2kweVR0TlBwc3Z3Cmd5c2lXMVRjZ01OMVVhYVVCTFJVSmY5UzRpM3NUVnVHRGNzMXZhSlVMc2NMWWhyemdnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUllVUs5Ui9qZWtyY3dEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpReE1qUTBNekFlCkZ3MHlOakEwTVRjd056VTBNREphRncweU9EQTJNVFV3TnpVME1ETmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTBNVEkwTkRNd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFDd3hIYThrZXZWNFBRUmt2TUNjZ1djREkvekYySkpiMUFRCkxPenI0aGhPbXhtaDluVVZvQUcwalJVMElzdWpoZkhuYjYrbFBDeDhmUGJHQjNuU1BsLzJRakxncG5TYUxudmgKNjVzSktaaDVMTFBzRWIxSStybnNWWWVESTV4N0QxUUR3Vi9IK21VeUZwbFEzM2I4a05icVhyZzhYTVl6eEN5bwpVNWdsdGg4RXljSmU5NVZKVVBFYzZtYUNiSVYrUllRVVJVQ1UvMDhDZUFYc0VURnljQTV5WW15TS9CUE0vcms0Ckdvb05vRzNKUlFvZ2Rqc0FsM3NyelloVzBFSU8wNW1PMkI5a1c4UktXcVppUWhaSFlRZ3JNQ3pwTUErSkIwVGIKSGxaUnphUVA4aHVUVEhxMXIzQWlMbHJWeUtJdGszTGpVWjladjBNamZ3aTQ5RXZTNXBnMUFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUWV5Z3lNCkl0R0RLdTMzdkUwZGF1WVo5eHJtUWpBZkJnTlZIU01FR0RBV2dCUWV5Z3lNSXRHREt1MzN2RTBkYXVZWjl4cm0KUWpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVlPNUZrbC9FU05FVnRKNS9QOUNrWXRrUVhqeWw4UWdZVURYKwptazY3ODdiOFVMS0ExMUdqZVF1MlhvUFFRYTBOUmoyWmFieVZxVUZ2Q3JKbHpOZXVrRjdOTHlzK0NEVEE5ZmtiCjhWZStiNWl1VHB2Zjh2YzIxM2pEQmlpdysraFR2WWt4KzJhQlhSdGxyVEtveWc2aVZrWE1SUGZXbDVJVitnV2UKelliNmc2bEZveGlVL0FvaXlFRjZIZWJIdVk2dUZQeDB4cmhWRjcwNDNqSkVFWmFROW5MTzdTdFZWbTdrR3VNawpsK09Ram1mK1UvSXZhMnluNGVwRkltazVjdWkzTTF3Rm9ReXhZZExNQXVhVzBpSFlNbVZ3RmRzbWxtM0dxOUZPClo1eGVvR0dhTW04WWpFOVpWa0E4UVNxTld5UEJzMDZFYkQ2RmhHQ1VldVorQkE0OHhRPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T07:54:09Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: d3b6f672-e6fe-4038-bcc7-6c90b6fbb631 service.beta.openshift.io/expiry: "2028-04-16T07:54:09Z" creationTimestamp: "2026-04-17T07:54:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"d3b6f672-e6fe-4038-bcc7-6c90b6fbb631"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T07:54:10Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: d3b6f672-e6fe-4038-bcc7-6c90b6fbb631 resourceVersion: "7778" uid: 57e13da5-556a-48fa-92de-f63375595dde type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-17T07:48:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T07:48:40Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "4098" uid: c64a715f-ac2c-42b4-bd91-04be9436d2cc type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-17T07:47:47Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-17T07:47:47Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1780" uid: d46e6720-8898-4c74-8c4d-020c6b0ae90a type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-17T07:48:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"41cf1e62-44ca-46e7-97dd-316a92cacb10"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:48:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T07:48:41Z" name: node-ca-dockercfg-tmwwc namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 41cf1e62-44ca-46e7-97dd-316a92cacb10 resourceVersion: "4228" uid: 1a8e0cf3-76b1-4826-b315-cba87a3a8a96 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-17T07:48:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9335614d-9b6e-49a6-8a15-9cb16f576d27"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:48:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T07:48:44Z" name: pruner-dockercfg-qlm2h namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 9335614d-9b6e-49a6-8a15-9cb16f576d27 resourceVersion: "4456" uid: 0e7e1815-3a49-4dc2-aa53-0910d760812f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-17T07:48:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a317b8ae-844e-449f-824e-527d74fd24f8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:48:40Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T07:48:44Z" name: registry-dockercfg-njxn8 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: a317b8ae-844e-449f-824e-527d74fd24f8 resourceVersion: "4457" uid: 5ec7139d-10c0-42cf-86c6-a6b164b0384d type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "37698"