--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T21:24:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7df6ba0c-54eb-446b-81d6-2e2cc6c98e4a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:24:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T22:00:45Z" name: builder-dockercfg-q4fz7 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 7df6ba0c-54eb-446b-81d6-2e2cc6c98e4a resourceVersion: "26786" uid: aea4ef92-fb2a-4da2-9844-f72750988d80 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-24T21:24:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"eaa23bdc-f093-487c-9c3d-21c34ae925fa"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:24:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T22:00:39Z" name: cluster-image-registry-operator-dockercfg-gl8bp namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: eaa23bdc-f093-487c-9c3d-21c34ae925fa resourceVersion: "26561" uid: a1fa5f49-40ea-42a4-8404-17ec57ff523c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T21:24:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e4506ff2-5917-464e-a650-ea468dd6cfcf"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:24:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T22:00:39Z" name: default-dockercfg-nhdjw namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: e4506ff2-5917-464e-a650-ea468dd6cfcf resourceVersion: "26582" uid: 89e85fca-fada-45b2-89c4-9718f82694c1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T21:24:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4f50590e-ae7a-4be0-9188-b2b611a7651a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:24:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T22:00:45Z" name: deployer-dockercfg-5sjrw namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 4f50590e-ae7a-4be0-9188-b2b611a7651a resourceVersion: "26769" uid: 4433a567-e119-4a42-87c0-cefd89e6c25c type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:060950e67ff4aa32903fd2b0bcede72726614136e669409715a87a9e8b2dc783 creationTimestamp: "2026-04-24T21:24:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-24T21:24:03Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "2013" uid: 1f3e1430-4ab5-4d8e-b4fb-30c38c7bca4d type: Opaque - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVFVENDQXZtZ0F3SUJBZ0lJUkZwdUJMcDNFeE13RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM056QTJOakEzTkRBZQpGdzB5TmpBME1qUXlNVEk0TURKYUZ3MHlPREEwTWpNeU1USTRNRE5hTURZeE5EQXlCZ05WQkFNVEsybHRZV2RsCkxYSmxaMmx6ZEhKNUxtOXdaVzV6YUdsbWRDMXBiV0ZuWlMxeVpXZHBjM1J5ZVM1emRtTXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRQzdVaWJXY0p0S09jUEVTTTFaaXNxR0FwMWhZNDBPT1hBTAo1dVQzS3ZyUkQ1elM3QXBmU3BrMUZiUkVzcWp5UTBLcStCMjFobC95ZjB2R3pTRnQ5WGkyN0VhbFgvTWZVZURECmxMNEFZdkZ1ZkdiZnExV2VLZjQ4SlBlQUpneXpNWWR0VDBLV3k3RURzS1JIRUUxRnJXZVN3OEVaYUlhSTBQNjgKbi9GOWxyUmtZZEF3RTJNMUt6RHNTNVMrWi9OM0hpR21YZ1BlYjJCcGp6U09KMzJZSFBTcVBMMDVGRVhDU1hYSQpDaGVtbE5OdTI0a3pRcjhoY2ZTVEJjWjBXMU9mRXNDb1lnSzhBc3Q5UTJ6Y1ZhTzhybDhhVW9jWDIzRDhTWW1vClJtcGJJMGJ4OFVDY0M4bVo5L0ppOEsvNEVFempXRkFZMDhkZ1JUaE9DRUJHeFk2d3JPUUhBZ01CQUFHamdnRWgKTUlJQkhUQU9CZ05WSFE4QkFmOEVCQU1DQmFBd0V3WURWUjBsQkF3d0NnWUlLd1lCQlFVSEF3RXdEQVlEVlIwVApBUUgvQkFJd0FEQWRCZ05WSFE0RUZnUVVGMXZxN2dlU1k4NGFDK3VsL3dxWExaT2prQTB3SHdZRFZSMGpCQmd3CkZvQVVYNmFsVlU0R3lROFZBZjlrbXZzaUFlNjJHdGN3Y1FZRFZSMFJCR293YUlJcmFXMWhaMlV0Y21WbmFYTjAKY25rdWIzQmxibk5vYVdaMExXbHRZV2RsTFhKbFoybHpkSEo1TG5OMlk0STVhVzFoWjJVdGNtVm5hWE4wY25rdQpiM0JsYm5Ob2FXWjBMV2x0WVdkbExYSmxaMmx6ZEhKNUxuTjJZeTVqYkhWemRHVnlMbXh2WTJGc01EVUdDeXNHCkFRUUJrZ2dSWkFJQkJDWVRKRGhtTURWak1HRXpMV0ZtT1dJdE5HWmhZUzA1WWpGbExUSTVNelUwTXpZM1lXVm0KTmpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVA1bitpMkRmR1RyVzYyK2tQS05MbSt5UTdPM2pzQ0ZZWUt0OQpKWVRac2wwdXNveW1LZUdNOGFsRE9UUDR0Y3J1TFY3NmR0a3ZlK25nSFlSRm5rWVB4bityMXhUMEQ2ek01Ylk5ClY0b1NIZFF6OUZXbzBMU284VUg4ZGFMT3FMT3ZJL0xmNmUzYU5ocm5vUU45bjc2S3VRQVdPSHhQNVlUcWt6angKaU50WWFCTWpLSG1Fbzkyc3oxRlNRWVhZaVQwRks4Mk1FWS9lWHR4cGxEWDdvcnpocFE3azhxMmJZdDQyV3gyawoxMFNHT2wycU9QcHpJU2FwdDZyMkpSWmhBblBMblYyMUVrRmVTM21RdlM3OFM5b3lhaTRGMHZyNzg5MFV4ZjE2CnRCV3A1ODJvQUN4U0p3UjZRTVZxakJWb3MzQ0dUSlRJZTV0WENLMUFHSUJjMzJ6Y2ZRPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlNSVRQS2lFd3Z2b3dEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTnpBMk5qQTNOREFlCkZ3MHlOakEwTWpReU1USTNOVFJhRncweU9EQTJNakl5TVRJM05UVmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056Y3dOall3TnpRd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFDNTZrNlc3VHpIdGZzRE4venNqZkYrSkFYVWtQZHZFQklRCnc5eloyRUdUa3kxRHVvcnVWemtvVmxUTUJJaDNqU0tRQVdUWVljVXM4Kzh5MXZOUnNDTTBTOFpkc2U5WHNDQTQKV1lMa1g2eXJKVjdoazFNWDF5bnFUeEc2ZExGTFpwUFBpaDJ1L0xxaW92dEhrRzBkZ3VKN0NNTlhWTUYrR3d0MQptUTVxNG84U21LRWdkWlZPMWF1dWxrYTBvWU1DMWsrclFWYjV3TDJUd0VKUVMzMnlTdk1EejVTM0pWUFV1MFJKCjgvbUUwSHgxdE1hZmkvUTVQSFY0anhBOGFQZmNnMGUxOGdvdW53UVZlTDNTejVWbkgyZnBMMFdsY1N4S0w4bUoKb3RNV2o2WHV0VGViZUlDRzlaZnlpdE1ZNVMxSVNlR0RZaXhkYjR2azcrZVd1dzlqRDlYWkFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUmZwcVZWClRnYkpEeFVCLzJTYSt5SUI3cllhMXpBZkJnTlZIU01FR0RBV2dCUmZwcVZWVGdiSkR4VUIvMlNhK3lJQjdyWWEKMXpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQW5DYUlTRVB4d3pJRU1YTDU2WFNTZ1l6MGFkbnlDbGowcWxiQQpwUHplYklaemdYby84a2ttYjVDQnp2RHB5MUtldk95akdvcmNMUlV5RURHb2ZiempPSzVwVnFFUTFiamMzMWN3CjZDZGtmRVJiOUpHVzByanZQcVowN05TdmFRTUE2cThpZkI5Zi9NcFQ4THFJR3BJc2Y5QkQ2RHYzVDArTDB0ZHoKY0hRRmZmanhWSUNQVzcxc3djWUtKblVoM1NoN2t5Q3NOczBMUHRDUXRNcWRDQjF2MURYeDJZelhBcjJidlE5MwoyNFlYZkZxc3ZqZkptWFNvYzE4ZHFGVC9sTEh0bHhWWDhoYWNneFJQaWVBTjdDZHNsU2wyOW9sbGpKcEF0UE96CkNIRlB5dlI5ZFlpSDRHMHpXcmd4QWhZLy9MQXduSldoS1dhb3kzWm95ZXlkbmljVXB3PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T21:28:03Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 8f05c0a3-af9b-4faa-9b1e-29354367aef6 service.beta.openshift.io/expiry: "2028-04-23T21:28:03Z" creationTimestamp: "2026-04-24T21:28:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"8f05c0a3-af9b-4faa-9b1e-29354367aef6"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T21:28:04Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 8f05c0a3-af9b-4faa-9b1e-29354367aef6 resourceVersion: "7241" uid: 58a9808e-3da8-4f40-8e2f-232be1c8ffe1 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-24T21:24:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-24T21:24:03Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "2012" uid: ebc3cced-22a1-487f-9900-55a7d810ffb6 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-24T21:24:01Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-24T21:24:01Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1974" uid: 62d29182-7345-4eb8-a143-503fcf1f8ae7 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-24T21:24:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"addd2357-77b6-4a57-915b-9f3330add5db"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:24:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T22:00:39Z" name: node-ca-dockercfg-gm5vw namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: addd2357-77b6-4a57-915b-9f3330add5db resourceVersion: "26572" uid: d408ac93-9418-456f-a86b-f03faaca0408 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-24T21:24:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8390bb85-7bb3-4bb1-b311-6d38a1cdffb7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:24:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T22:00:39Z" name: pruner-dockercfg-nfvcp namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 8390bb85-7bb3-4bb1-b311-6d38a1cdffb7 resourceVersion: "26564" uid: 21da6640-f683-447b-9556-3bd7d5106429 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-24T21:24:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7fc50901-b7af-47ab-8b5e-c38791d3c65b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:24:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T22:00:40Z" name: registry-dockercfg-bckfb namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 7fc50901-b7af-47ab-8b5e-c38791d3c65b resourceVersion: "26617" uid: c3c2fdec-6de7-4aff-85c6-ca7bc6d36943 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "32636"