--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T07:47:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5d33b189-8dc6-4f7b-8d6e-2bdc77ebd160"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:47:33Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T08:23:33Z" name: builder-dockercfg-8kn8l namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 5d33b189-8dc6-4f7b-8d6e-2bdc77ebd160 resourceVersion: "25611" uid: 6014643b-8bae-4157-9fdd-581512aa7708 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-17T07:47:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"90240a09-bb91-4725-88bb-d3505fc62eec"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:47:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T08:23:28Z" name: cluster-image-registry-operator-dockercfg-7b6qb namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 90240a09-bb91-4725-88bb-d3505fc62eec resourceVersion: "25448" uid: e9b0296c-1409-4484-b6a5-8d3785ba6033 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T07:47:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a9156005-a5d5-47e0-87a0-7185b9d3dc82"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:47:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T08:23:28Z" name: default-dockercfg-4hwvh namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: a9156005-a5d5-47e0-87a0-7185b9d3dc82 resourceVersion: "25458" uid: 5b0ec535-2558-4a2c-817d-c92e20d5c383 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T07:47:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7c06eaf4-7251-4b3a-8578-ce241ef0330c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:47:33Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T08:23:33Z" name: deployer-dockercfg-d589b namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 7c06eaf4-7251-4b3a-8578-ce241ef0330c resourceVersion: "25627" uid: 88b1887d-c389-4066-8162-13c5a86a3abc type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:66c52d7fc5e1ffb3b36b8679e34a43dc2787fd35ff748ba855f1f145fddb0426 creationTimestamp: "2026-04-17T07:47:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T07:47:12Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1844" uid: 73e96d46-6e03-4914-884f-18c2326fd191 type: Opaque - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVFVENDQXZtZ0F3SUJBZ0lJWklqSVJhN2ttQ0l3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qUXhNak01TmpBZQpGdzB5TmpBME1UY3dOelV6TWpKYUZ3MHlPREEwTVRZd056VXpNak5hTURZeE5EQXlCZ05WQkFNVEsybHRZV2RsCkxYSmxaMmx6ZEhKNUxtOXdaVzV6YUdsbWRDMXBiV0ZuWlMxeVpXZHBjM1J5ZVM1emRtTXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRRFlpOHBhQXBZREdoOWtieEUvZU1ab2V1bGhlWnlKVXd4ZgpFR0prU2ZTbGJPSkdZSnZsN2E3NzQxV1E2dWtFZ29QT05hdXhxMmozamFqRjl0cEtUMmRFdkQxT0w3Y1NNNnhqCnFMdGczMUE0LzBCVzZlT2VyYkthcjVzNitMcEl0NFQwa2ZvcXBwOVZiRXhqeXZPeXlNb0FXT1VoL1pjaG5IVWgKdU5iOVBNM2dOWUVyS0FXbVhyUDE5QlRsSXplREUzNnhxajA4UnJ5MVVURFFCVEZzZUNIR3loMDd0cHVhU3loYQpocksrQjBhNC9Xb0ZCUjNWbVYray9QVGFpT1dQOUVmR2U1Smg3ZmMyNWhxQXpOTnJ0enB2T2VXc3BWajYyTEtCCjkvOW5wMHU5SnZ1UkkxVUhsQ2dMSEh2YkVOSnpjak1vVzVEVWNKNlE4VEppNWdrYzVhclhBZ01CQUFHamdnRWgKTUlJQkhUQU9CZ05WSFE4QkFmOEVCQU1DQmFBd0V3WURWUjBsQkF3d0NnWUlLd1lCQlFVSEF3RXdEQVlEVlIwVApBUUgvQkFJd0FEQWRCZ05WSFE0RUZnUVUwWUREWGl5MDN5L3ROTHljS0VVVTVDU08vYk13SHdZRFZSMGpCQmd3CkZvQVUwbHJrd0x0Z1d0NXZBR3htajlwcGtWUmFNbGt3Y1FZRFZSMFJCR293YUlJcmFXMWhaMlV0Y21WbmFYTjAKY25rdWIzQmxibk5vYVdaMExXbHRZV2RsTFhKbFoybHpkSEo1TG5OMlk0STVhVzFoWjJVdGNtVm5hWE4wY25rdQpiM0JsYm5Ob2FXWjBMV2x0WVdkbExYSmxaMmx6ZEhKNUxuTjJZeTVqYkhWemRHVnlMbXh2WTJGc01EVUdDeXNHCkFRUUJrZ2dSWkFJQkJDWVRKRFV6WVRsa05UZGtMVFk0TnpVdE5EWTFOUzFpT1dNeExXSmtZalJtTVdFeVlUVTEKWXpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQUxJLzU1VE5LOVBkd0VMaVMvMW91Rm4xUFNUeEZwMVhqVDcxWgpsRlE0dCsyN01UVFM2YmpyK2hNMGxoZGw3b3RsNVBuNU9RMzdBdTRYNU5jUzZiV2FJLzB4cWN2UnJqUHhYYmVoClErVjRNN3ZVYzRQbGZpVTRqQVpVRGlYME5qYzJJR2YzRndQa05CZVFVNVZpQ2UzTFkzdHZNbTlocU1HWTBsTmsKM3BLK3VVcjBzQzUyQXA3Z2VaaHUvMjhCR1N0OHBIeGg1SnVQVkx6ZWFPUS82NnNpditvUGhtcjBVbjFtTTdhVgpINE5DWjlHb1dMdGJPV01ZL0l3YjBWNzU5Rys5cC90QTJ4MlFYV2F2UzFnVXdxVG9VMzdtaWVrajNNcTB5ZXpqCnd0QXhWUjZZU2hkdW1OdkMzK29ndWJnM0YxbVhZSlA2Tmh0RkoyM21JdHV4R3ozbE5RPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlZWjVoekY0MWNva3dEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpReE1qTTVOakFlCkZ3MHlOakEwTVRjd056VXpNVFZhRncweU9EQTJNVFV3TnpVek1UWmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTBNVEl6T1RZd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFDWlJzd1ZPMFZTQ1BxREYyQXhJYmgveG1zSEhRaFBDRlhICjd0SXR6TVFqNHV3a04xeEkvUlhpUlRzUXlMazdRbThmQThyRXNpMFY4ZEE5aGJlOG83cFNIUjBXd0N5MUdBSm4KWUgrZ0lkaktUUzRFc2dQSzFNbHYyWlJadDEwcnRYalJJRmNtL3VoQVRPTGs5UlBLVjU0OXJNOHJobWtYYUlNMgpDcWVGbUtqT3JSTlpqblNpUTQ4SGp3dVFzMUl0c3RaTUZhYUtJeG5nb0twelV0b0xHTi93TktVTFZQaWhsMlpEClFxZDY5TFlCMWxJSU1TWE5KcCtzbkVvTGR1Y055dTRXVEo0Tm1LZkhWUndvL2QzZUJJMlZyTHdIdXJGdkZadEgKQVZQVUNubGVCTWtka0FYUDJmTTRUbklsdTUybVhNSjNiVzRoV294QnVqZlZnNjc4TkFRZkFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCVFNXdVRBCnUyQmEzbThBYkdhUDJtbVJWRm95V1RBZkJnTlZIU01FR0RBV2dCVFNXdVRBdTJCYTNtOEFiR2FQMm1tUlZGb3kKV1RBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQUdkMndnbFZnYnc0U3kyUlN6NGVwMDdnaDgvZkRVTHpoU0gycwpSUEY4MTU3b2JhQzRWS0NWL2FvK2ljVHBKR1cwdUZzU2NPbkFVSWZ4UlFwWUljbjIvYTl0TThmLzQrK05LWkx2CkdSSUtycnlRNXRrNmVYWWpSMnhrbTdnTG5oY3g1ODNVTUM0RHdsblBCcXNhcjNNWmpvUGVHODZ0VWlXZFozQnIKWnpiN2E4U0kyNGp5aGlpYlN0K1ltdHl4eXJWR0M0QVh2by95cXRnUHR2emx6QWkzbGtGMktCQ0l5T29zZHVLdAp2cENvdXpEODRiVXFZMWFydUQ3U2VmaDU4OGNGbkE1Z2l4OVUzcElIQk4xT1BLbjM5QWxsUC9iK3VyV2I0SHkwCmZ2WTB6MnVGNmdlMTRaN2t3eFZFWENxVm9ONy9QcDJidXBNbXY0RzlwQTZ3WnBWQmtRPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T07:53:23Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 53a9d57d-6875-4655-b9c1-bdb4f1a2a55c service.beta.openshift.io/expiry: "2028-04-16T07:53:23Z" creationTimestamp: "2026-04-17T07:53:24Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"53a9d57d-6875-4655-b9c1-bdb4f1a2a55c"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T07:53:24Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 53a9d57d-6875-4655-b9c1-bdb4f1a2a55c resourceVersion: "7693" uid: 133263a4-4309-4457-b974-6274d297e7c0 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-17T07:47:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T07:47:12Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1842" uid: 36c8ad95-9cc2-4bcd-a94a-97bfdcf62efd type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-17T07:47:10Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-17T07:47:10Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1682" uid: b6058228-f25b-426f-8312-9357abb299fa type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-17T07:47:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6068e15f-484c-4b99-9696-fae0ffd24478"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:47:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T08:23:28Z" name: node-ca-dockercfg-kg88g namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 6068e15f-484c-4b99-9696-fae0ffd24478 resourceVersion: "25436" uid: f788b966-95cd-45c1-90de-befbdb7fa6cb type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-17T07:47:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d49befaf-fa2f-494a-b336-df292b69d885"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:47:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T08:23:29Z" name: pruner-dockercfg-8lbdf namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: d49befaf-fa2f-494a-b336-df292b69d885 resourceVersion: "25501" uid: 8afe7157-e7cf-4318-a8db-2b63c79b7109 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-17T07:47:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"71a139b7-5c2d-4dc4-8d28-5b47c3321998"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:47:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T08:23:29Z" name: registry-dockercfg-6xw8q namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 71a139b7-5c2d-4dc4-8d28-5b47c3321998 resourceVersion: "25487" uid: fd4d935c-ed35-4b1c-a242-2e086bc869d3 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "39889"