--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T18:43:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b981edeb-59d8-43c8-bb24-504641e75d71"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:31Z" name: builder-dockercfg-8c6dl namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: b981edeb-59d8-43c8-bb24-504641e75d71 resourceVersion: "25580" uid: dd17c5da-ba00-4888-b183-87eb9bca02f7 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-22T18:43:26Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5c8a1858-9042-4a3d-b865-65f158693fdf"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:26Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:26Z" name: cluster-image-registry-operator-dockercfg-tz5gx namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 5c8a1858-9042-4a3d-b865-65f158693fdf resourceVersion: "25388" uid: 26026840-e45d-458f-911f-465a766d1043 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T18:43:26Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"de32393d-a498-4c45-94a2-3bed82d04c06"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:26Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:26Z" name: default-dockercfg-trqfl namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: de32393d-a498-4c45-94a2-3bed82d04c06 resourceVersion: "25390" uid: 0a809724-650b-49f4-8197-2af94b355f86 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T18:43:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"34f57881-44dc-4c63-8275-479f22a63f45"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:31Z" name: deployer-dockercfg-zx775 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 34f57881-44dc-4c63-8275-479f22a63f45 resourceVersion: "25576" uid: 49c36e6b-e631-4d09-98cf-733b1ac4f3b0 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:f84ab5d94e99887bd484dff1cf49ba3ab2a07d9cc9868cea5a4e5d411ea2370f creationTimestamp: "2026-04-22T18:43:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T18:43:00Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1813" uid: 0b329d4c-d0f0-478c-9859-0f7bc42a919c type: Opaque - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVFVENDQXZtZ0F3SUJBZ0lJZUdoQXdyNTl1ell3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qZzRNemMwTWpBZQpGdzB5TmpBME1qSXhPRFE1TURsYUZ3MHlPREEwTWpFeE9EUTVNVEJhTURZeE5EQXlCZ05WQkFNVEsybHRZV2RsCkxYSmxaMmx6ZEhKNUxtOXdaVzV6YUdsbWRDMXBiV0ZuWlMxeVpXZHBjM1J5ZVM1emRtTXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRRGVGSXI3Sm8vRGFFVHdScmY3c0RZWGE5NTFMQjFoMi8zMAoyTW0zUjlpZ2h3OVNaMGtBQXBxY2hjRTl0ZWRONUhDU1lHS2NtWmVQbk1yWXY4YVRaanRMN1dYQW1mejcwWU5JCkNqWTJGM2prVFVrOHAzSVZmRUZ3bVZ4Ym5qZ2JrY3dGZmZQRnQxcW10dmo5U2pvT2FodUZjSWdkWTNMZFE0SFQKd1FTQ2gvYnZUZ1VjdDZoSEtiNjJ1Um9qQWc2WXNPdHU5M0djcmZZeG5LSXU5OTd3eFg1aGZpZGs3RDBCVVBJOQpua1l5cnpXa0k2ZWRtZFgvMEdIanV4dkdpNkhlY2NJOWpnU3k0NTVoUWtnVWdwSWdwR0lyTWRRUmltaTVFaVdVCitiODAyeDRBQml3eTRWTTBtdjVqL2NobGVKSGIvaWY4N3BqUk9GSUVUbDNKNXZCVmh6Y1JBZ01CQUFHamdnRWgKTUlJQkhUQU9CZ05WSFE4QkFmOEVCQU1DQmFBd0V3WURWUjBsQkF3d0NnWUlLd1lCQlFVSEF3RXdEQVlEVlIwVApBUUgvQkFJd0FEQWRCZ05WSFE0RUZnUVViMmVaRXFLajV2cjhoeXRac3lQbzI2Y0RneTR3SHdZRFZSMGpCQmd3CkZvQVU3QVh1MU9SSHpyQWdjdTZvVnBZK2dBb2lPYTh3Y1FZRFZSMFJCR293YUlJcmFXMWhaMlV0Y21WbmFYTjAKY25rdWIzQmxibk5vYVdaMExXbHRZV2RsTFhKbFoybHpkSEo1TG5OMlk0STVhVzFoWjJVdGNtVm5hWE4wY25rdQpiM0JsYm5Ob2FXWjBMV2x0WVdkbExYSmxaMmx6ZEhKNUxuTjJZeTVqYkhWemRHVnlMbXh2WTJGc01EVUdDeXNHCkFRUUJrZ2dSWkFJQkJDWVRKRGcyTW1GbU5UQTJMVEkwT1dJdE5EVmlOQzA1WmpGaUxUYzROV05sTkRnMk5tVmwKWXpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWpjZUNVWGdQRWVHLzJtanVCSXAxcGJFRFJHbktwV3AwWldhNwpYSG8vaEJ0cDJ5NWhkcDVydG5iRWFaSzFUcFJOSGxzQU0rQ3dDWFpndnJVSys4bmNFMkhpbzJDS2c3N0FiVmU3CkNqV21CMkZSYlNYb1JWSmFwa1NTU0R0bmlTZU5XQmxCakNILy8vdHltdHJNTmhVS2dFY0RzS2R1SVVGKzFRcEQKODBuNTlOOXYxL0dyWENjUFBrRzZEUk9Fd1V1YkdyN2VLU3ZPWTMxZGJoZUhDYjVVb3NBZStyT1FVYUVXL2lwZApJYnFTSXF6cHZrNDBSbXlqMzdpS1hXY0h2MEJvV21aNm5iZUZzRElTVTBhU2RtVFFkVU9DOHpTaHArWGhRS2lOCjJFSjE4WGRsT09qWW1KaEUrZzhaaWdrcmRJejZMRzhCOUVwcG9Pc25oOGtzcFlvZXJnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlibkdON0Rxcnp3NHdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpnNE16YzBNakFlCkZ3MHlOakEwTWpJeE9EUTVNREphRncweU9EQTJNakF4T0RRNU1ETmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTRPRE0zTkRJd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFEamtKeTFVWjU3aVpUV044SXQyRStxYjBCc1krTlZPSzQ5CnVXdWJHbHFQMTZwWFBUdTBncGxib2FYQjl1K1B1WkdIRXk1bFFzZkI2aU1Ja3lpdEZpNldmNENzVlhRaGcrTDQKdSszMzVEWm13VmdZNnZaSy81VXJlR1R6Sm13WmlLOS9GcDJYaFNTQzZDZFVkb1Nyc3Mxa1A0UkFuS1VKOHNOLwpReHdwaERMZFVCRlpWUEttR0FRMFB0OWtFT1dZWmlnRUxuaXFkSEVEL2RReGZ5R0dLK1JsN1NZV0ZRMVFwOVRXCm8yTWNablpjNElXV2NHTzhRUzlpeUxEb0hLZ0ZUYXdyeHFSVmt2eDZPdXJ5VVVxSXdvVUJGd2xIMG1nTkpGVmIKbFk5VUw3WFd1R1RDdzNxclF1Q2R4UHp0Z05NQ3AxeWJOT0YvZHUxK1RrbERKWitzckQ3QkFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCVHNCZTdVCjVFZk9zQ0J5N3FoV2xqNkFDaUk1cnpBZkJnTlZIU01FR0RBV2dCVHNCZTdVNUVmT3NDQnk3cWhXbGo2QUNpSTUKcnpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQW9DdDRNaTZsV3lWTndtMk1VSG51OUtvSnI5R0p2Uk9HTDl5RwpPa09MUW1tdFgyVHJKeGc4N0pUV0I2eXR1UG5jS243VTZOd1ZBcEF4UjczTXRQL1Vvd2FkLzd4NkcvTFd5K0pqCkVWNnJrdUkwanhtT1ZoNjR2OTVRYnJQUVhLN3p4ZVA5VzFsT1lQNXFURzRYTzZUci9IU3ZnVG9LNVA5dUJ6RTMKYTdieXEyT3VDYkFSOWpEYW04aHc1cDhEWDF4T1d6NTFUeDMwZ3VqM2dWQllRRkZabmJqc05xdE5QNWV0enlKVgpOU1ErYUVSMkJ2aGhjY1BIOHVPQzBueXFHNnlmYTJhMGxsRTZJejNDY3J5NlhUYzB5VXVhUStEVXJMRzRCaHhDClJBMGlsb3ZYTnQ3cmJCclU4MlpDSWl1dERmQXNmTFoySjFGbWd6R21mcmVucEpQSW1nPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T18:49:10Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 862af506-249b-45b4-9f1b-785ce4866eec service.beta.openshift.io/expiry: "2028-04-21T18:49:10Z" creationTimestamp: "2026-04-22T18:49:11Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"862af506-249b-45b4-9f1b-785ce4866eec"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T18:49:11Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 862af506-249b-45b4-9f1b-785ce4866eec resourceVersion: "7736" uid: 5e12aa17-fc55-4ff7-8af6-a6ed788e33c9 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-22T18:43:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T18:43:00Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1812" uid: c9ca01a1-d801-4c9a-9027-461770d0a35d type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-22T18:42:58Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-22T18:42:58Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1675" uid: 7601db05-d178-442e-aa7e-d0cc39c31e52 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-22T18:43:26Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a5bfb9ef-dd21-4c5c-b496-adc876730824"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:26Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:26Z" name: node-ca-dockercfg-zv54v namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: a5bfb9ef-dd21-4c5c-b496-adc876730824 resourceVersion: "25409" uid: 563a3c8e-5a6c-4b96-9abf-289496d3948e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-22T18:43:26Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"52435759-ae13-4204-bda0-294e7ea49255"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:26Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:26Z" name: pruner-dockercfg-dx2g8 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 52435759-ae13-4204-bda0-294e7ea49255 resourceVersion: "25403" uid: 64b66589-0119-46bc-85ca-52281f184ced type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-22T18:43:26Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"69e72e7e-f612-4d53-8577-79e32190b37b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:26Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:26Z" name: registry-dockercfg-vkfzv namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 69e72e7e-f612-4d53-8577-79e32190b37b resourceVersion: "25387" uid: 87c070ce-6c42-4c51-a5f9-bb8f993e7bd1 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "42514"