--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T18:43:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:43:16Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6157e2ef-9917-4445-a9ea-6eefe7a72dcc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:16Z" name: builder-dockercfg-xsrgn namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 6157e2ef-9917-4445-a9ea-6eefe7a72dcc resourceVersion: "3812" uid: 7a32bb41-b02d-4f60-881b-a5988f8b9613 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-22T18:43:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c8e29b37-4973-41b2-8ef4-cb73738f93e6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:43:11Z" name: cluster-image-registry-operator-dockercfg-b4qzr namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: c8e29b37-4973-41b2-8ef4-cb73738f93e6 resourceVersion: "3214" uid: 7826cb30-9a57-4268-94b7-4d68c32fd1c2 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T18:43:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ab4b0a20-9c17-4849-9f62-38968320e45a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:43:11Z" name: default-dockercfg-jjmgr namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: ab4b0a20-9c17-4849-9f62-38968320e45a resourceVersion: "3215" uid: af22f685-388e-4a8a-b14e-fb4f084f94c2 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T18:43:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:43:16Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"74202e2b-c415-4ecc-b919-e328a55fe214"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:16Z" name: deployer-dockercfg-ndds5 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 74202e2b-c415-4ecc-b919-e328a55fe214 resourceVersion: "3811" uid: 4c29c889-8046-4310-877a-39e6c55533fb type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:c6d5c76cc7e7f2c9812a1058edadf45e5823e42665b4b8a36eeb0fe835d06e4a creationTimestamp: "2026-04-22T18:42:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T18:42:45Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1824" uid: f152b445-0736-4244-bfe7-53824752cebb type: Opaque - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVFVENDQXZtZ0F3SUJBZ0lJQVo4ckdoM2MweUV3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qZzRNelU1T0RBZQpGdzB5TmpBME1qSXhPRFEyTkRaYUZ3MHlPREEwTWpFeE9EUTJORGRhTURZeE5EQXlCZ05WQkFNVEsybHRZV2RsCkxYSmxaMmx6ZEhKNUxtOXdaVzV6YUdsbWRDMXBiV0ZuWlMxeVpXZHBjM1J5ZVM1emRtTXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRRDVGT2NQejVuUDBqRlhDTEJIZHZaQ0kzcHJOQjNwNnI3cApLcGE5dDR3QnFnSXFpK1hLbTdhd2d2cDJ4bUtRTk5wQzA5YUZ0U3hIWDRuZzJiZmkwODV4RmNDSVlmMnJNTzRzCncwSjNlN0IzUk00VlhTbXdOTFp3M2E2eHZLRWpTUHV5QVk2K083ZzdhOWpsQnpvS05jazNLNHRYVURENnByRXUKeUxPbjRvM2dubW1jVTh1bnFRMkM1Zmo0c1FxTmtOc0Z5UllKL0JWc1E2Mm5wOE9iTG9UMGJSSTdrMTQxb09VRgpBeGVuY3RwNFJQeDEzbGxFZ3pNZGxRQ3VrSTJSR3VRenV4UGlkbld6d04vdzhuNFV6SWNvaXo5SksrNlBYeUgrCjY3clM2aXN3UXFIUXFzdmZhWjR3L0NBaC9uMmRkcG1LWWVpbHFsaEhIblR2KzFsVEZIYkJBZ01CQUFHamdnRWgKTUlJQkhUQU9CZ05WSFE4QkFmOEVCQU1DQmFBd0V3WURWUjBsQkF3d0NnWUlLd1lCQlFVSEF3RXdEQVlEVlIwVApBUUgvQkFJd0FEQWRCZ05WSFE0RUZnUVViMkZTS2pjSURJSXl5bnFJMWVFRXlUODAvcll3SHdZRFZSMGpCQmd3CkZvQVVNbE5WeENWaEd5OU4vTUpuUVFQWmhCTFBFRDB3Y1FZRFZSMFJCR293YUlJcmFXMWhaMlV0Y21WbmFYTjAKY25rdWIzQmxibk5vYVdaMExXbHRZV2RsTFhKbFoybHpkSEo1TG5OMlk0STVhVzFoWjJVdGNtVm5hWE4wY25rdQpiM0JsYm5Ob2FXWjBMV2x0WVdkbExYSmxaMmx6ZEhKNUxuTjJZeTVqYkhWemRHVnlMbXh2WTJGc01EVUdDeXNHCkFRUUJrZ2dSWkFJQkJDWVRKR1JrWXpBME56WmxMVGMxTUdZdE5HWXdNeTA0TnpNNUxXWTBPR1JqT0Rkak5ERmoKTVRBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWlBcEhBWFEwQTFqVnhLRUloYlJTTVRMNXJPTFZCcmhRNnZYQgpzM1hFNVhmWWxGZ1FMbGNzVHpoYVVQYjI5VXAvUEpPSzlISUIxMElTRktQRGRIeDBTY09vS2dZbWFTYlRUQ2VmCmJIYklUYXpUQzA1LzJsUVVqUklWYnVVbzBGWVEvQkZONTBSV2VpbEZxV294NE05WDJ2anViM3FWNXE4cnBvSG4KZUxxaGhwODk0M1BqYUNFbFoxYmtUQkV3QVI0bUJlbmlibll1aG5jYUtWVDBxNEc0cmhQVHFKdjQyU29pcDc1cwpjaFNJWklGOHVqeWt5ZG5sbGlXWGRzbi9TUXdQSjk3U2hCUS81d3JuZk4yMER3bWp3LzlNMUVJRjAzZHdWSjRRCjV4eHZBWXNNRjJ4MzlXcW96MTZQQzZyUWhhNlc2TG9vOXFwc0FrSElWN2FMNkkzQkNnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlSdmI0aXBqYTA0QXdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpnNE16VTVPREFlCkZ3MHlOakEwTWpJeE9EUTJNemhhRncweU9EQTJNakF4T0RRMk16bGFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTRPRE0xT1Rnd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFEQzdVVlZpN1QzSElpbk9VK2FJNWduSGtua1RFMHYzUUdXCm5PNm5WeXBFQlZsS1JSVGlFazRpTlA3TWROWU1zK2lPM1NEQ0ZkRXYzNjEvUWF5cGM5QStEZ2JKbFF5czIwMzgKYXI1M3JDNGt5SGNnRXdIaUVHdW9EWVltaGZmRmV5eEk0eVA3TkNVVkZsUFo0MnhqYUxRYlZUS2VFZXFQZ3prWQpaL28vQmdJY0ZmVnA1VUt5RFE5QzlIM0VtaXBEdWx5YnJYMVgvVzV3aWR0eC8yTlRveWpXRHB5djI5R2VNOGQzCmhUUS85TUw4M0N0akx1aVY1a1d5WWltZWxrcE4yMHd1Rk5UclowRHh5Zi9sN3p5a3k0eWxzQU1lcUEwbTJqOVIKUkQ2djVSdUYyaDdlZlkyNGVRWFRKZ0srR0wxMmNhOUNwNFZ1YUZoV29yUmxiYkQvL0RNQkFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUXlVMVhFCkpXRWJMMDM4d21kQkE5bUVFczhRUFRBZkJnTlZIU01FR0RBV2dCUXlVMVhFSldFYkwwMzh3bWRCQTltRUVzOFEKUFRBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQXF3cU1OMHByanh2SWpVNnBHWW9mMUthaWRZVmNBL21JT1FoRQo0ejU0ZDh0U3FMeTMxOXYzajN6aTJTRUlrbFFoaUVVRDQ4THZrZjl5Q3Jhb0RvODNpK2ZEQXFycWhaUkxaYjBlCllydmErSWppV09IVW90SGNNa1hNLzhWV0hCWllFMmVCRlpWWW9VMXIwT1RQMGZGbjljNFdDeXRMMG1waGRnMXIKcXB2bzErWlczYSt2cjliWU00YWdvYlB5OFM4SVc5TXVXQURCL1ZpaXo4WSsyeVVtTk9wUTgwcWFERWZEb2dkaApVK3JRdDZFYTZ6UWZMVHA2aVBrL2pURC8rV1VBUkVLN0EyZE1aUWVQRnhTc3pocDNSeW8rUEpiVTFSdGtlRnM2CkJjK052djkwSk9DWmdWVmV2Rm45NDh2YTZ0SVZuL3QvUzgwbm5IVUlLSG44SktOTzVnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T18:46:47Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: ddc0476e-750f-4f03-8739-f48dc87c41c1 service.beta.openshift.io/expiry: "2028-04-21T18:46:47Z" creationTimestamp: "2026-04-22T18:46:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"ddc0476e-750f-4f03-8739-f48dc87c41c1"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T18:46:48Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: ddc0476e-750f-4f03-8739-f48dc87c41c1 resourceVersion: "7015" uid: e1ce5d18-c923-47d7-8510-a6e2c129cbf2 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-22T18:42:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T18:42:45Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1823" uid: 5dd586a1-8f69-4cb1-a205-555ceff404c2 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-22T18:42:44Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-22T18:42:44Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1703" uid: bce66278-4dd8-4186-97e3-e8877de718d2 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-22T18:43:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"379bdc32-40c9-4bb1-a994-e0d7ef225fba"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:43:11Z" name: node-ca-dockercfg-zxb2x namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 379bdc32-40c9-4bb1-a994-e0d7ef225fba resourceVersion: "3219" uid: e42b72b3-41ed-4fb4-9f23-8feffc1d6380 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-22T18:43:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3fc0468b-e023-46b8-a64e-a5c71e6ac0f1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:43:11Z" name: pruner-dockercfg-vmj7n namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 3fc0468b-e023-46b8-a64e-a5c71e6ac0f1 resourceVersion: "3222" uid: 0ec6fe71-74c0-4e61-9461-d7720d7372af type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-22T18:43:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1bd6784c-5007-4723-b09c-ebd441275d45"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:43:11Z" name: registry-dockercfg-mvb7n namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 1bd6784c-5007-4723-b09c-ebd441275d45 resourceVersion: "3233" uid: 93191569-c33c-4e78-a8c1-8a84ee1bba77 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "20858"