--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T19:50:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"77e8f1d7-0977-4e68-b759-9616f787ec4c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:50:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:26:27Z" name: builder-dockercfg-fgnl5 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 77e8f1d7-0977-4e68-b759-9616f787ec4c resourceVersion: "39031" uid: e4e184ab-112b-45cc-94cd-9ae9a37c2625 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-16T19:50:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"78062d00-cec7-4e9d-a698-38a7d1d64313"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:50:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:26:22Z" name: cluster-image-registry-operator-dockercfg-fnx4n namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 78062d00-cec7-4e9d-a698-38a7d1d64313 resourceVersion: "38857" uid: 8cefb48b-07cb-49cb-94e4-d38e26d4996c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T19:50:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3935791b-a9c3-428e-b4ce-a751b87ecca6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:50:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:26:22Z" name: default-dockercfg-r69f5 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 3935791b-a9c3-428e-b4ce-a751b87ecca6 resourceVersion: "38864" uid: 11b35da4-489e-4104-b6a5-a8854355f475 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T19:50:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"afef0cde-ba6e-475d-a569-0e4ecc7b067a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:50:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:26:27Z" name: deployer-dockercfg-959nc namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: afef0cde-ba6e-475d-a569-0e4ecc7b067a resourceVersion: "39028" uid: bb39c945-995a-487a-873c-c4ebe89b4456 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:b77b2b0c1a61505adb9a21ae7767bdafd559a124c7300b275d56b0e90f1ae1a8 creationTimestamp: "2026-04-16T19:50:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T19:50:08Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1622" uid: 31f1d441-a2d5-4c2c-a680-487614176b00 type: Opaque - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVFVENDQXZtZ0F3SUJBZ0lJZEtFZFQwK1NXc2t3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qTTJPVEk0TnpBZQpGdzB5TmpBME1UWXhPVFUwTlRKYUZ3MHlPREEwTVRVeE9UVTBOVE5hTURZeE5EQXlCZ05WQkFNVEsybHRZV2RsCkxYSmxaMmx6ZEhKNUxtOXdaVzV6YUdsbWRDMXBiV0ZuWlMxeVpXZHBjM1J5ZVM1emRtTXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRREpsampBMVZLNFdIeGs2VjEzZ1FKTCt0U0pRQ01lbEttWQo3b08zdjVlZUhVaHhBVytkYkxIZ1BOYUpsWFlzYVpZbHcxNW5QSFBSWnFnS1MyK0Faam1WU21YMGRnNmtUT09RCmN3a0duOHRGa1pLUWcxbVBndUFmUDlxM0Y1TUZ5OW0vVDFUSy9WR09MajlPOHF6cW00aTJTS1NObHpnMFk5V3UKRk1rWmlQaE5mb2h2clY5TnJ5WXNlSjVSQldUYktBRG9yZDVZVkpmZUFHQ1A4cmZjOUVqTTB0SUo3cVV5cStBbwp6bGM0WUxEMVVVRExSTzBMVXRNQU02UzdkMlhvcmdsNU83ZXYvZEJ6dks5c29LVVpPWUlRY1E3dWhJRlNuOTEvCjJ3UlE0dlptTjJidkdTZUhrZE80UEVBUnhQZ0dFUEJwblNVZEZoVlk1TEVXMFdWSGVTNm5BZ01CQUFHamdnRWgKTUlJQkhUQU9CZ05WSFE4QkFmOEVCQU1DQmFBd0V3WURWUjBsQkF3d0NnWUlLd1lCQlFVSEF3RXdEQVlEVlIwVApBUUgvQkFJd0FEQWRCZ05WSFE0RUZnUVVyV0RGU2FERGlOdkNVZnA0RUNxbW9qS3ozdEF3SHdZRFZSMGpCQmd3CkZvQVVnSWhxYmhoaC93U0lYdStwOWdXa0ZBYVdHcjR3Y1FZRFZSMFJCR293YUlJcmFXMWhaMlV0Y21WbmFYTjAKY25rdWIzQmxibk5vYVdaMExXbHRZV2RsTFhKbFoybHpkSEo1TG5OMlk0STVhVzFoWjJVdGNtVm5hWE4wY25rdQpiM0JsYm5Ob2FXWjBMV2x0WVdkbExYSmxaMmx6ZEhKNUxuTjJZeTVqYkhWemRHVnlMbXh2WTJGc01EVUdDeXNHCkFRUUJrZ2dSWkFJQkJDWVRKRGRrTnpsaE1qQXpMVEkzT1dZdE5HTmtOQzFoTVdZNExXTmxZVGhsWXpNM1lUVmkKWWpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWw1UGxxbVNIb3dZdHN3NkZuc1d4RFlENkpLbzBSUDN5OVFFbQp1VGRCeWZOdyszVEVjZGcwcURmTXNTVlRENkhDemg4OFdsQ0dPL3hlT2dZLzZ4UmxWN0VON29EUk5UMFd5NC9VCjczaVo3WUc0SkZNbFNUSHZSUkVJVlJNTTcxUlB1WW5sVlBSbVRvRGtJUStORlJYWGdLcXNOQjVRR1dRVzdVa0gKUnByL0NZWXZ5TDZyZ1BMZ3dFUHdoSHZZZVlCWXFuTUEzOGNhUWtZK0xWdVlXUTRwNlh0VEpkTlkvWi9BV2Q5ZQpVaHdLRXd2WTRodFFuSkpoblVTa2s4amFKcm4wVllLd282SUMxZHNqQmlOQ3ljUDdPOWRydDBqRlFrYVJ2V28yCkZpaDkzcjgyTGlWS3pmZkZxT2hrcnAzWVVIZnA3bUhiMXVLek96OGtrd0E3Wnl1V2ZnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlieWczUDZMK1RGNHdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpNMk9USTROekFlCkZ3MHlOakEwTVRZeE9UVTBORFphRncweU9EQTJNVFF4T1RVME5EZGFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WXpOamt5T0Rjd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFDcU9sM3FnMFlZTWMvM1pXOFV4UFFIa2FlVjZvRGNIei9YCnFJdXJWVUFxbm5STmE4bFVaM3RBSVdCcUNRbmRtV3FnZFAwMllWakM2K2JFTGFibmx6eDVnNGdPMW5mSG9qdXcKVWFzUXZ6cFlGZktXbTkyYW9yY2x0TENoREdXNEh6dDNPdk9aV1lzMXBmSkIvMS9UUjNyTmxLazl4eDZoaDlNVQoyY2JxaEdJVXY5MExYN2tXeE9rcTJRcGNVK2RwSjdnUjQ2M2hsWHJ5R2tBYjFmVDF4Q3dOSU50d3hmamdma25NCkhOeXBtQzNrMHFNb1ZoMVRGNEc1R2dYMjNtWEZOR1owTHdtVDUvUnpHbFdhQk5IeGVGbnBmbDRMQm5TVVNIRUIKUFBMeFI5WmQzaU1JSml3ZUZrdC8rZXVEYWdNTmU1M0V0RlZEaXJic1JFT25MYS9EM1ZrMUFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCU0FpR3B1CkdHSC9CSWhlNzZuMkJhUVVCcFlhdmpBZkJnTlZIU01FR0RBV2dCU0FpR3B1R0dIL0JJaGU3Nm4yQmFRVUJwWWEKdmpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQUpvbVJHQmN4M2ZWL05MTWRrZXUwT1NUazA4WWNaMUxqN1daTApXMG4xQW1GcGJXNXhISG11NUVWbjlpZjhNK2hieFdhN3RDcTlHNjh4SGFqYlA5V1pnK0xwN1ZrQjVTSDFCOFVVCmpiYzJzRk9OWjRuL0FvZHhkeWF4L1lXWmQ1eXdwK1NCb2g1QmhpbjFJeXJ1Rlg5aGhJT2hXUnVLYnBKcGlXeVIKSkNLQXlRSWtJTWY4Ukxwbnd1d2xCdW11UmpuMGpwMVdnMVR1V0hjRjdSREhTR1gxcVkzNE1scmlCcGkwSVZpbQpaQzBPNU5OYjhWNUN5RVV0V2wrWDlNdkRZUnQ1bEV2YlZEL3EyVmpJdko5dVVyb3VkR2hHN1I4ZVBRQ203SVBhCmZRT2VKMitWVHpYUTF5ZDVxc1VFUGx1ME1tNGdSNnhyRmpGUkkzclIzKytTZ3JVSjZnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T19:54:53Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 7d79a203-279f-4cd4-a1f8-cea8ec37a5bb service.beta.openshift.io/expiry: "2028-04-15T19:54:53Z" creationTimestamp: "2026-04-16T19:54:54Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"7d79a203-279f-4cd4-a1f8-cea8ec37a5bb"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T19:54:54Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 7d79a203-279f-4cd4-a1f8-cea8ec37a5bb resourceVersion: "7269" uid: 1889e5df-237f-4fa5-b66e-80a572e2784b type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-16T19:50:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T19:50:08Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1621" uid: da79e7c8-fa26-4cd0-89b3-f96704a56507 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-16T19:50:07Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-16T19:50:07Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1568" uid: 5cabf013-cd7b-4da8-bc52-27a429c21cd8 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-16T19:50:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d8306619-3240-4316-ad79-d610ba7d3348"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:50:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:26:22Z" name: node-ca-dockercfg-6fbqq namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: d8306619-3240-4316-ad79-d610ba7d3348 resourceVersion: "38855" uid: 7c3bf113-8fd5-4b21-ad52-a55d83ddb055 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-16T19:50:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e2347ffa-019d-40fe-84c1-2cffcbfeb2a5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:50:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:26:22Z" name: pruner-dockercfg-lrnfw namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: e2347ffa-019d-40fe-84c1-2cffcbfeb2a5 resourceVersion: "38863" uid: d9c99cb8-3a22-4ae1-9ed7-55cb05a0d94f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-16T19:50:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a3c456a1-a11b-403c-937c-82de7ae8871f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:50:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:26:22Z" name: registry-dockercfg-nfjh6 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: a3c456a1-a11b-403c-937c-82de7ae8871f resourceVersion: "38859" uid: 5c9a21bc-f892-4402-b33d-b2e4975e6b16 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "39818"