--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-23T17:50:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T17:50:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"19cf663b-6831-4271-887e-a7c4ae65da86"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:50:42Z" name: builder-dockercfg-k9kv4 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 19cf663b-6831-4271-887e-a7c4ae65da86 resourceVersion: "3952" uid: b4a0b7c3-57cd-4845-99eb-593b9326a14b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE4OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-23T17:50:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T17:50:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"59d63752-4736-4bb5-b244-80dc5147e0d0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:50:37Z" name: cluster-image-registry-operator-dockercfg-pmw52 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 59d63752-4736-4bb5-b244-80dc5147e0d0 resourceVersion: "3437" uid: 3710f5b7-960a-442c-9b97-cf9508fb3c79 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-23T17:50:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T17:50:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a1788863-ec7f-4e09-a2ab-f61e02f17d22"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:50:37Z" name: default-dockercfg-kwldv namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: a1788863-ec7f-4e09-a2ab-f61e02f17d22 resourceVersion: "3438" uid: a68a991a-271d-44f4-a51f-addd48c550ec type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-23T17:50:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T17:50:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"02e1fdc9-84a9-4e3b-8730-7211d8acd340"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:50:42Z" name: deployer-dockercfg-d4ck6 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 02e1fdc9-84a9-4e3b-8730-7211d8acd340 resourceVersion: "3951" uid: 409557c6-4516-4ce6-8a7f-f53c91f01dfa type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:b3bea10a22e91160c103404224ecd106457e5c8f714cf87c1c81cd68319c6999 creationTimestamp: "2026-04-23T17:49:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-23T17:49:21Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "2498" uid: 04884712-9867-456d-a184-7b8b78553174 type: Opaque - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVFVENDQXZtZ0F3SUJBZ0lJTEpQZG1NbVl1MGt3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qazJOamsxT0RBZQpGdzB5TmpBME1qTXhOelUyTURSYUZ3MHlPREEwTWpJeE56VTJNRFZhTURZeE5EQXlCZ05WQkFNVEsybHRZV2RsCkxYSmxaMmx6ZEhKNUxtOXdaVzV6YUdsbWRDMXBiV0ZuWlMxeVpXZHBjM1J5ZVM1emRtTXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRRE5hZm1mVWFVK2NnR2l5cnM1TkZNM2p2Q1o5Rko2OVFIZgo1SW12eVVGemZtdHl4Vm5IcUo4VmFJSDhwZy9qdzJPU09xb1NUMS83aHRDYkx1VEZ1eDRETDVNT0RqaUNGanpYCnhDYVJ4NFZjNnk5WjdZa3Q5OUtwOHJEbHVjVGhPallyNk1lWSt2L2trVDY3bDZpRFhERE5mSDM1b3lrdnZjMDUKV2Q0djAzUDhIVzNxdGYvVzVyN3p3aUVUVW9ibEtYUzRFRVN0c2NhUVA1OWNEdE9ZanNGdkxPMy92YmpGTUpqdwpzMGJWclYwbjM2WWhQSFNzQThPVEs4OXl3RHhBZ0NDWU43K0dCSDFueTlDdThFUkhIVzBjWEtEZ1BmWU1XR3dUCm1UT2dmVlhOS3JvbGpQZ2lnQkZXNDFsNDVIUjVNSUI0SXBMK2dhUlZRbklmUWI5ZC9HNXRBZ01CQUFHamdnRWgKTUlJQkhUQU9CZ05WSFE4QkFmOEVCQU1DQmFBd0V3WURWUjBsQkF3d0NnWUlLd1lCQlFVSEF3RXdEQVlEVlIwVApBUUgvQkFJd0FEQWRCZ05WSFE0RUZnUVVuUHhoYWNWd0ZacHI5RHdzVDlJVGZOTjhwZUF3SHdZRFZSMGpCQmd3CkZvQVU4NmFzT3BRRlROSmVBL1FmQWZJR0N5SURMRTR3Y1FZRFZSMFJCR293YUlJcmFXMWhaMlV0Y21WbmFYTjAKY25rdWIzQmxibk5vYVdaMExXbHRZV2RsTFhKbFoybHpkSEo1TG5OMlk0STVhVzFoWjJVdGNtVm5hWE4wY25rdQpiM0JsYm5Ob2FXWjBMV2x0WVdkbExYSmxaMmx6ZEhKNUxuTjJZeTVqYkhWemRHVnlMbXh2WTJGc01EVUdDeXNHCkFRUUJrZ2dSWkFJQkJDWVRKREV3WmpRd01XTTRMVFprTVRZdE5HTXdOUzFoWTJVNUxXWmtabVJqWm1ZM1pXUXoKTXpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQUtQbE9WNFVlUVU0eE9DL24rWGlYcldIRTN5NkpkNjBwSEZ4NwpNZHlySzYxd2hKaEtuSFJyWFNTNzlKczRMZXh6VkNzMVBTcWVuQlJQWWw4U1NyOXIwdmdhdUR2akt2ZVh6c3BpCkNTQWJVQkRpa3JOd1J3Q3JCM2dTa25WdzZTMHVBZisvY0pPVEdhWTFMU2phT0ZUUGVHc2YvMUdKeG5IUmxub0wKWk5MYkgxL05FUHZWYWIrY3MyZVVBM3EyWXBzN0ZXU0hGQ3FRZTcxZGJCOGJEZE1OQ0FNYkl6cUYwSXY4VTczbQp2QTNYbHVHVG1sVk8ySjIrUzlhUWhRaCtkL0tKbFRuTGRPbmMwMHlMRXpiS29YY1kyeFcvbndZUHkxbXRpeXVMCnV1YjB5VG9uM2IxbnZHb2czOCtZTE5qTEdQYTZXT1d0RVVGUUYrdWhiZ0dQcVZsVy9BPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlZWWlqNjdQWGNDSXdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmprMk5qazFPREFlCkZ3MHlOakEwTWpNeE56VTFOVGhhRncweU9EQTJNakV4TnpVMU5UbGFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTVOalk1TlRnd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFEUnlDU0loL2s5VjRvVlR3TGhtdTUzR0xGY3QvbllWV08vClVLVUN4cENrSUFOeE9tT056bGx5Z0ZCUVNycXdRT3FqZ0JKWWZiRzIzRDhaclY1NUdtSGFJckIrS1c3d29SVFEKWkpBTk1uT2krY0NCZVRrWXIrMGFyMVVhVS9McXZmTXVSajI5R1JwTmxCUU1qTWx3dFo0QXYwY2svZWVaemV4YQphOEdMcUQzTDlrRmVvTVZDTUxleDV0aWplV1NVSVdzNTVvY1puazdBTWRwUy9MUVBINDRaSkY2NzZmTC91N0NaCjVTdGc4MHhLMXI4ejcybVBWTTZGNjdvNTl1ZnJVS1hDQ3c4Z3VHZUJDaUlabExWUlJnMWh6U25ZNG5zVVEzclcKRU1tZmR3NTJDa0o2L1p2L2JzcStJTFYza29vc0t3YzdMSzFrZ1dtYS9DMmVpN05qbG5yTEFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCVHpwcXc2CmxBVk0wbDREOUI4QjhnWUxJZ01zVGpBZkJnTlZIU01FR0RBV2dCVHpwcXc2bEFWTTBsNEQ5QjhCOGdZTElnTXMKVGpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVZmMllnZ3FhUUZTWTdJWld6ODdMbUpIcHRYSWlPSWdVNmhaRAo3TE9rTC9hREtuNnRJWW0xckNESmViaTk0YjQwcXpNUDZnbzc4bjBtTTlsY1EzWkJ4ekU5REdYd3pXWDQwekRZCktYRDFpQ0pnWEk5aFdDKzI3UnRrSnphUHVQNEhJaERUQmk2NE9FamE2dG40ZnVzSk5pYWlFOFBaaDZKcFhNNjUKZDAvS2ZIMnpaM3Z2bXhsSjcrTm9zQTE4RFZ4bWJCb3QvNG1mRVlQeDdUQ3lGNHV2aE5KZmc5ZE8wcjhFZTlUMwplRVZ1c0tnbjZkMjNwMmo5RjVpajlWa3o4blhNZUg0aCtrUklxdkZwOE84QUdYK2VnY2VWaTV6bmt5d1F0Q2RFCjZMbS9DRHdoOVdTYmR2TWhjZWFXem44eEN5SEpqa1I1YklPZzNNT1lBSW5JNkl5bThRPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-22T17:56:05Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 10f401c8-6d16-4c05-ace9-fdfdcff7ed33 service.beta.openshift.io/expiry: "2028-04-22T17:56:05Z" creationTimestamp: "2026-04-23T17:56:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"10f401c8-6d16-4c05-ace9-fdfdcff7ed33"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-23T17:56:06Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 10f401c8-6d16-4c05-ace9-fdfdcff7ed33 resourceVersion: "7729" uid: 25d03ac8-a8d7-4e8d-aff4-af03d4f5564b type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-23T17:49:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-23T17:49:21Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "2497" uid: e7e94e4f-b2de-4e29-85b2-0fcee3233fba type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-23T17:48:35Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-23T17:48:35Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1708" uid: 5c05fccc-3402-4930-811e-a00d8d2afe1d type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-23T17:50:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T17:50:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6015a88b-1bbf-40c9-9119-9874a88900a3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:50:37Z" name: node-ca-dockercfg-4nmd5 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 6015a88b-1bbf-40c9-9119-9874a88900a3 resourceVersion: "3442" uid: f5099fb7-2a38-42ae-bec0-b077db097814 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-23T17:50:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T17:50:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2a34a12a-1bdc-4810-ab52-aa548ef3e906"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:50:37Z" name: pruner-dockercfg-9hgq9 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 2a34a12a-1bdc-4810-ab52-aa548ef3e906 resourceVersion: "3446" uid: 13cfd3f8-7c58-4aca-8315-827fc672c570 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-23T17:50:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T17:50:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0c354a73-4e02-4551-99a1-fc78f2f47045"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:50:37Z" name: registry-dockercfg-f7p8x namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 0c354a73-4e02-4551-99a1-fc78f2f47045 resourceVersion: "3456" uid: fe1a26f1-ce99-4cfe-a07d-dee2438527be type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21075"