--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-23T17:48:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fb281068-9acf-4f0c-b8c4-6f05cfda293b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:48:41Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T18:24:41Z" name: builder-dockercfg-q2vt6 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: fb281068-9acf-4f0c-b8c4-6f05cfda293b resourceVersion: "23590" uid: 27ae8e2c-8430-4de5-aeef-4567aa69a102 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-23T17:48:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"134146bd-15b0-4f45-b0f1-c08d3536f967"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:48:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T18:24:36Z" name: cluster-image-registry-operator-dockercfg-smpvg namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 134146bd-15b0-4f45-b0f1-c08d3536f967 resourceVersion: "23428" uid: 7be6d6f6-9797-4296-b91d-f75916919512 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-23T17:48:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"34c9d5d8-eeeb-4a2b-861e-c318841c4e06"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:48:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T18:24:36Z" name: default-dockercfg-2q98b namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 34c9d5d8-eeeb-4a2b-861e-c318841c4e06 resourceVersion: "23413" uid: 0d1f4ab8-4c85-4516-a697-99793a9ac951 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-23T17:48:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a865a742-8aff-4d4b-9700-fdebb539da9c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:48:41Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T18:24:41Z" name: deployer-dockercfg-5572x namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: a865a742-8aff-4d4b-9700-fdebb539da9c resourceVersion: "23599" uid: 1d556d7f-56c1-40e7-b1ed-f9997bd45bc9 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:d232b84fc12fe470c1691d52318bbb96bfa7d63644e06387898c7fd82391b70f creationTimestamp: "2026-04-23T17:48:26Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-23T17:48:26Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1774" uid: 9e77933c-e625-4eb5-81e1-ae3257b05861 type: Opaque - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVFVENDQXZtZ0F3SUJBZ0lJT3VxZExhSXNLNmN3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qazJOamc1TURBZQpGdzB5TmpBME1qTXhOelUwTlRkYUZ3MHlPREEwTWpJeE56VTBOVGhhTURZeE5EQXlCZ05WQkFNVEsybHRZV2RsCkxYSmxaMmx6ZEhKNUxtOXdaVzV6YUdsbWRDMXBiV0ZuWlMxeVpXZHBjM1J5ZVM1emRtTXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRREM0SFpXNnhDNEZ5eFdlMkRwamJpZ25ZTjVNUjU2VmtvTwpmQjg4Qm80dUZ4bzc5REZqSUNBUlVLSUh0OE10aXdVMm8yVDhBWURUL2paRm1vaHlHcnI5NGhtaXRENEhCOE1SCndOeTFmT3VYNWxjQlo0azVUNkZpS2ZqQUo3eFQ2QmQ4TzZMME5TUTJscVpuWjNwcEZ0TVFWMUVtNnozUXlkQy8KYXpMQ2RhdElodkpSWVdSTXU4bHA1WkJOcTlvblpaREFxeUk3WU9ZNnRzeTI3QWZzSExZdVkrUitDUElKdktkQgpqdTV6dXE5d2dPR0xNVHhXdjhXK21uWDhxbTZNQTR6bU5RbjJtSFN0dzl2RCtyRTNVd2dJK3RjcUFZWkNaeHhnCkFEMWtvOGlybGJySm1TdkxsRTQyZm9kSlQxV2s2dnVUMExjUWkzNW5mejBpaXhNeFVwWUxBZ01CQUFHamdnRWgKTUlJQkhUQU9CZ05WSFE4QkFmOEVCQU1DQmFBd0V3WURWUjBsQkF3d0NnWUlLd1lCQlFVSEF3RXdEQVlEVlIwVApBUUgvQkFJd0FEQWRCZ05WSFE0RUZnUVVFZE0vOXRXSmh0aFEzeXlKeU1zWC94SXNwNTB3SHdZRFZSMGpCQmd3CkZvQVVGRHp1OTR2N0YrSThJTkx0QkkvTENScG96dEF3Y1FZRFZSMFJCR293YUlJcmFXMWhaMlV0Y21WbmFYTjAKY25rdWIzQmxibk5vYVdaMExXbHRZV2RsTFhKbFoybHpkSEo1TG5OMlk0STVhVzFoWjJVdGNtVm5hWE4wY25rdQpiM0JsYm5Ob2FXWjBMV2x0WVdkbExYSmxaMmx6ZEhKNUxuTjJZeTVqYkhWemRHVnlMbXh2WTJGc01EVUdDeXNHCkFRUUJrZ2dSWkFJQkJDWVRKR1ExTVRVeFl6UTVMV0kwTnpndE5HRmpPQzA0Wm1Oa0xXRXdZbU0wWldSa01ERmsKTnpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQW1IR1l2aW5SZEJDYUVBVXRFeFVlTEVmZ0FnRVoxZ0k1K082aQpGOCtMQ0xuY1JsaTREOUNHY09tRUZFektaUnVxbzg2MDVBMnRkd3hMTytGMjFKKzREdE0xd0k2bi9ZVXJLZlcrCmk4NXNIOTU4T0d0ZzVzN1FHQml3cGxDUkxuYUppbWdOL2E0d0dETlZkdFp3eXpBM1BXRHNLbTNFNHJuazh6TzgKSmhYUElUanF6am5nWXlvalRCTnVzeFRTRmw3ZmQ1VUlXY3NFQ2pJWE5UcmlsZlFESk1qcDU4YVRhMGtrT2JKNQp0QVVzU2lRQU1iM0ZCRDRkdUttenh6VU1wUkF0WEZ2ejRwRlJacEtkWDYyK2VZRTRsTDJuS1ZxWFhQOWFMQmhJCkpwT2FuNmlWVWVoT0dxM21lMG5qQUE5NlBFa2hvNUE0c2pINkNRZko1VGFhbkcwTnN3PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlFNTRtR1ZrUlhtNHdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmprMk5qZzVNREFlCkZ3MHlOakEwTWpNeE56VTBOVEJhRncweU9EQTJNakV4TnpVME5URmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTVOalk0T1RBd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFDd1dhV0tndjFIZU5qWVRWUExGQkNlMHBBbmRkNnBMSHpBCm9oeE42Smp3NTNWOE9KeFZzTXQ5RzJsT3NWdVJ2QU41emY1UzRLMzhNRVZiSEdyZjJqQnBySDlIcmFxcG1TMTkKZVRPd3R0clJXSUg3akQ4V0ZHaXRuc3ErRkJhcG1xZWI5K2tBT0EyL1FsSGpzMnBnNERmQTlpUGNPSXAyNWNmTgpoS0NCbEt4b251elk0Nkt3V0RkNTBVVTNNZkt0NXB2QVZwRktFRjdiQjNNSzBMVTRUWU9CMk5YZ3Z5RGtZQ3FPCmdkcUp6SmtYbzhuOWlHK2ZjOVhISklmWElEbExORlIxVUxTUU5xM01DaWZCUzF4M1A4eWNOaDhRbmZKZnp6bmsKekJjOWFxMGpMOHpnZE1yQTc4UEk1d1RuSWdScGJORTVqRkFDa0w4NlpFSjNoVkVTcXgxMUFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUVVQTzczCmkvc1g0andnMHUwRWo4c0pHbWpPMERBZkJnTlZIU01FR0RBV2dCUVVQTzczaS9zWDRqd2cwdTBFajhzSkdtak8KMERBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWZ2WUdFdWRGOEtLN1NmZmcxT3hMTUNWL1Z4UFJNdXREdmVDRgovb1VWT3dpMTBwTDRMVncvdzVLalFyeFhJb3pKTnUzMTNRb2E3RkhTRGFZZ1JJYkhXcFdta1RRc01IQ3J3dExtCjk1SlpHK3V3Q2JQM2xSN0FNdUhKUWtHMlU0MnNHUUJnKzgzdW9HSmxtUmIvYVpGQkNxT3JDWnN4RVpKT200VEUKZVJVSGpBOCtvWXdYZWVVU2t3N084UWlmVTNQY2pnTTljWEZvczlqN0dQcm9iUDgzQnN2a3BxdW1STHd4bFNHegpuc2t0UVYwaUVObWQ2TWFvemVudDFxL1haUm9wSCtnRm82WmNHdUE5RGdZQnNrRDdGOC8wR1FLU0daak4zeno5CnNPRHIxaFJFM2drQXF0WXUyU0JwNDZsbU1GeHdOUUpFWFk1NUpFMklHMjZlbFpZWjBnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-22T17:54:58Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: d5151c49-b478-4ac8-8fcd-a0bc4edd01d7 service.beta.openshift.io/expiry: "2028-04-22T17:54:58Z" creationTimestamp: "2026-04-23T17:54:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"d5151c49-b478-4ac8-8fcd-a0bc4edd01d7"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-23T17:54:59Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: d5151c49-b478-4ac8-8fcd-a0bc4edd01d7 resourceVersion: "7356" uid: 77917e8f-ab39-4e3a-bacc-424eb4a12509 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-23T17:48:26Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-23T17:48:26Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1773" uid: 42743ed9-9b62-4c05-81bc-d192cad3c99b type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-23T17:48:24Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-23T17:48:24Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1651" uid: 3103f8da-7e11-4aba-bc14-ac96086964cc type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-23T17:48:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d6a1ae29-ce65-4fd0-870a-459f7f6d68c8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:48:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T18:24:36Z" name: node-ca-dockercfg-p7l7k namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: d6a1ae29-ce65-4fd0-870a-459f7f6d68c8 resourceVersion: "23407" uid: 656e2429-eee9-4250-a283-7d970d468fdd type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-23T17:48:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1d7203bb-c3d6-4d3f-9969-655d30cb236b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:48:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T18:24:36Z" name: pruner-dockercfg-nd7jr namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 1d7203bb-c3d6-4d3f-9969-655d30cb236b resourceVersion: "23412" uid: bf6cd2bd-1669-40c7-a2d2-df7bbb1267d1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-23T17:48:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c3b121e4-1a5c-4d54-9b2d-d21695ee5507"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:48:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T18:24:36Z" name: registry-dockercfg-ccrfl namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: c3b121e4-1a5c-4d54-9b2d-d21695ee5507 resourceVersion: "23421" uid: a0846fb2-1d30-4e29-a0af-34477c7f9c25 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "35821"