--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T22:10:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"52f74ec2-3d9f-4dc2-8243-3276cd06418c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T22:10:00Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T22:10:01Z" name: builder-dockercfg-crthr namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 52f74ec2-3d9f-4dc2-8243-3276cd06418c resourceVersion: "4224" uid: ec3d79b8-9c2c-4a89-a16b-035b3897551a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-16T22:09:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T22:09:55Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"507f62aa-7e4e-4ad8-9322-a7a36584d3fd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T22:09:55Z" name: cluster-image-registry-operator-dockercfg-87thc namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 507f62aa-7e4e-4ad8-9322-a7a36584d3fd resourceVersion: "3558" uid: 2197c720-e592-46be-b986-2c6d41556382 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T22:09:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T22:09:55Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"dce3a213-8d76-4b82-b435-c5dc0dc63b65"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T22:09:55Z" name: default-dockercfg-xs7m2 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: dce3a213-8d76-4b82-b435-c5dc0dc63b65 resourceVersion: "3568" uid: 18183b16-8e01-4bc0-bf3b-a815b391cc61 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T22:10:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T22:10:00Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"14cef6a7-c7f7-4898-b5d7-3d8fb31c408c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T22:10:00Z" name: deployer-dockercfg-26k9t namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 14cef6a7-c7f7-4898-b5d7-3d8fb31c408c resourceVersion: "4215" uid: ac0bd59a-65ae-48c5-891e-4846a5c04c62 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:c7f859979623d053df0b70cfcaacb17b9d01fc93c2c88f646cb26da5b12c6155 creationTimestamp: "2026-04-16T22:09:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T22:09:02Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1926" uid: 42008e5f-5b2d-4183-b057-eae5491a8bfd type: Opaque - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVFVENDQXZtZ0F3SUJBZ0lJV240cGd0VlpsV1V3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qTTNOemN5TnpBZQpGdzB5TmpBME1UWXlNakUxTXpKYUZ3MHlPREEwTVRVeU1qRTFNek5hTURZeE5EQXlCZ05WQkFNVEsybHRZV2RsCkxYSmxaMmx6ZEhKNUxtOXdaVzV6YUdsbWRDMXBiV0ZuWlMxeVpXZHBjM1J5ZVM1emRtTXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRRFoxTzZoVWNudEtoWUhLTUFCWlFpSVc2d0p2eEZpQzVkTQpJNm15N2wzR2dpQTl6djA0bk9ZVlRPVzhsSWhxaEJveW11VGZLZWQ2a2luelZneTNta1VhWWJCV1BmdXNsVDRjCk1VYk1PZ05JcDVFNGxiaFBEbHFTVUpjR21aOTVPdExGVUgrSEMyN1RBYWZ6RGZwWVYrdVFVemRJZDZTZ05ROGsKYlJnQ2lhV1JjaXA4U1hULzkzcVFPQWkzK1B5T1RZU3FmcjUxT3BabUpmRWd4dEMyUWZ5WXE4amwyYWQ0d05rSwptM1F0VkVDendZd0plSW1JckUwd3JZUXZ1aTVpcUF5a2hwck9pZHZWODd3RUhGeWFsQjFxQkp6ajM5bjJrVXpXCmpEUzFpWmI2VFdMTkhhOXVXRlluRHVSWmV1SXRpQ2JtYlh5Ky9pNnRWNkpFRUw0MUkxWGRBZ01CQUFHamdnRWgKTUlJQkhUQU9CZ05WSFE4QkFmOEVCQU1DQmFBd0V3WURWUjBsQkF3d0NnWUlLd1lCQlFVSEF3RXdEQVlEVlIwVApBUUgvQkFJd0FEQWRCZ05WSFE0RUZnUVVOQk8vNUtZNkYxdnJ5cGpyZUU2SkQyYlJIeGt3SHdZRFZSMGpCQmd3CkZvQVVjVEs5T2FuSHF1Ujc4dmMwQTlrMkJ6WFVEcUl3Y1FZRFZSMFJCR293YUlJcmFXMWhaMlV0Y21WbmFYTjAKY25rdWIzQmxibk5vYVdaMExXbHRZV2RsTFhKbFoybHpkSEo1TG5OMlk0STVhVzFoWjJVdGNtVm5hWE4wY25rdQpiM0JsYm5Ob2FXWjBMV2x0WVdkbExYSmxaMmx6ZEhKNUxuTjJZeTVqYkhWemRHVnlMbXh2WTJGc01EVUdDeXNHCkFRUUJrZ2dSWkFJQkJDWVRKR0l6TjJOaU1XUXhMVEJtTWpVdE5ESmlaaTA0TjJSaUxUZ3dOVFF3TWpZeVlqQmwKTnpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVRNWlpIMmVEVjVjTUc5N2pJMDBHczFYV2x4Q0QxSG1rclAvVgpydytueC95L0xKYWE1cDNmRTBQTzhBS01pc2I0UTV2bUJpdzFiUUJXWS91dDR6VUl6Qzc5WUd2aTQwWEJlQ3hYCjRydWtwV0loK0xDalJBRWlsaTk2YXdyc0hHREdiSWFrTWtieVNOeFZ3NFlZd3gzeGk0a2ptSEw2WGRlUmxLNVMKNVIwVnpJWXc2SHo1MXdSQy9qSmFoR0QxbHl2RFZiakozZFduTVIyNytMZmwxOWNXb3BNTS80RDltSktnNFdPMwpkUlI2cjYwS0xGU0dGQng1YnI0YlVoVXNnTGpwVlA0QnNhWE9qR0VReW4zazdWbHIzbXZmalZEUmZBSFNQQkVZCjA1Nm5DcUJKdDdjR3d4L2o1QW44MndmVG03TElPU20xS1lQV2htb05JMFhCdjNFNHNRPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlTSkRnaXFJY2RDOHdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpNM056Y3lOekFlCkZ3MHlOakEwTVRZeU1qRTFNamRhRncweU9EQTJNVFF5TWpFMU1qaGFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WXpOemMzTWpjd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFDczA4MHhjamJLbHpwWFNuYW1Gb3pIQ0lxS2I4WXhWRkc4ClBLTThJUjRjRTBwY3Z1cEVITzB1T2Q5ekk2azRXcFlJL2xRY3c1L1lxY1hhSG1TSHdYdWtPK0ZKalQ0dUtzUmoKb3pJaG9jYk1qK0RNR2tDRlRaajFvNGlLeW9yRy9qNHp4QVNKR242LzZtQm1qODZjTmRLc3dKdXdrbWJaREhWeApXaXJ6dzM1cGhqbEthOExjLzdramZnREZWdWF6R1pIWEV5WGtiS29haHMvb3FVcnI1QnJlRlAvN0IvbysyYTdrCnQxSXErS2E3QnR4emwrMDE2NjErSjVzSDJQR28zTmlqZ0R5d2FLMmZvVnZzVGdwZEFiQTJDZEUzRmdvMlZ5N2EKTS80YXRMUmZKNmJNd3NtaHhXaU91YVpDb3JZdnM5RXhubi95aTNuR3BpcHJnU2gwV2JlbkFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUnhNcjA1CnFjZXE1SHZ5OXpRRDJUWUhOZFFPb2pBZkJnTlZIU01FR0RBV2dCUnhNcjA1cWNlcTVIdnk5elFEMlRZSE5kUU8Kb2pBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWRVU3ptM0FhUGF1cTNLZmFEMTc3KzgyY21xa2RvVEJ2VDMxWgpINUJzeWdMa3VrOUovMlprUUhaUjFwUnVwbWZPem5xWnRWc2hOVURRdVlhZy9TTVpBZXVRRXBFUEsveExOSk4wCnY2Q0Nidi90YllLNnFKVlQ2VUNFSzQ0VjlnYXR1U3NOQmhDSUttT2tzVWN4bXFLRmVRNStMUUxBQUpFQ01OYzEKd0tXcGdtSWRkd1NCYWJzWDBVRTNNWE53R0RlZGVvRUlmNVJBaWN1ajR6bkVMM3R3aVVzUVZFenNvdVRpZEZPUwo5Q3puM3Y5ckc1ZHBjRnZZWGxXZG5hMGhYaDJPY1V0eG9XU0drdWVGQ0tvV1R3ekRuYklUT3VhZUM3S1dMaE8yCjVBWVBoQ1F5eTVtd0Z0YUMwZThZUVFGbHlhdzJWdDQxV3RwWUNET2xBN0FaS2RLYWNBPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T22:15:33Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: b37cb1d1-0f25-42bf-87db-80540262b0e7 service.beta.openshift.io/expiry: "2028-04-15T22:15:33Z" creationTimestamp: "2026-04-16T22:15:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"b37cb1d1-0f25-42bf-87db-80540262b0e7"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T22:15:34Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: b37cb1d1-0f25-42bf-87db-80540262b0e7 resourceVersion: "7760" uid: 1aec2dc2-6504-4867-98ea-5b6b7734274c type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-16T22:09:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T22:09:02Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1925" uid: 43010d5e-caf4-46cb-baff-ce317d88b012 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-16T22:08:58Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-16T22:08:58Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1750" uid: 3e9356a3-6b1a-4642-8335-8fd735eae5ef type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-16T22:09:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"81c0a70c-fd3f-4220-bd2e-1d357ad9e916"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T22:09:55Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T22:09:56Z" name: node-ca-dockercfg-prx6s namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 81c0a70c-fd3f-4220-bd2e-1d357ad9e916 resourceVersion: "3595" uid: cf2a6368-a08d-4f5b-839f-11851613f730 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-16T22:09:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1a338be8-283b-4c88-8504-89944b8c1fee"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T22:09:55Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T22:09:56Z" name: pruner-dockercfg-9r9g7 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 1a338be8-283b-4c88-8504-89944b8c1fee resourceVersion: "3587" uid: cca59f83-8cd5-4d24-83ea-28beab89d7df type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-16T22:09:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ee682a21-656c-4f11-92ba-867666760399"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T22:09:55Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T22:09:56Z" name: registry-dockercfg-s46c2 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: ee682a21-656c-4f11-92ba-867666760399 resourceVersion: "3588" uid: 557debf8-9075-4a04-afef-aa414d45963c type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "36567"