--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T18:17:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2fe6befa-250e-4ded-8146-8b9d66ae1ba5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:17:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:17:31Z" name: builder-dockercfg-pfnxh namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 2fe6befa-250e-4ded-8146-8b9d66ae1ba5 resourceVersion: "3952" uid: 32d09931-a4e1-45d5-b164-340c73c8dab6 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-22T18:17:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"09153862-c837-4f7e-8c59-7a070bfab878"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:17:00Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:17:29Z" name: cluster-image-registry-operator-dockercfg-qnvlm namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 09153862-c837-4f7e-8c59-7a070bfab878 resourceVersion: "3777" uid: 14c5e2f4-9abf-49c2-9e2e-11fadd7314b1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T18:17:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d95fc801-01a6-4337-bfd4-87c794672ba7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:17:00Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:17:29Z" name: default-dockercfg-dn47s namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: d95fc801-01a6-4337-bfd4-87c794672ba7 resourceVersion: "3782" uid: a9082108-14fc-464a-bf9d-3d2bf8e3983a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T18:17:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"799777a0-4d2f-4675-bce5-288b4bfb5853"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:17:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:17:31Z" name: deployer-dockercfg-kkqhh namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 799777a0-4d2f-4675-bce5-288b4bfb5853 resourceVersion: "3951" uid: 536d1c98-43d2-479c-94f4-da56db6d6268 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:186781a17a07d972fb7d44314e05fd1ddd064a6bf27d5f89bbf5de6b18ef2598 creationTimestamp: "2026-04-22T18:17:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T18:17:29Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "3672" uid: 2bd6d507-17b7-4f70-837b-6f44d0021866 type: Opaque - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVFVENDQXZtZ0F3SUJBZ0lJYlFEeDJaVE9yNEF3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qZzRNakEzTWpBZQpGdzB5TmpBME1qSXhPREl4TVRoYUZ3MHlPREEwTWpFeE9ESXhNVGxhTURZeE5EQXlCZ05WQkFNVEsybHRZV2RsCkxYSmxaMmx6ZEhKNUxtOXdaVzV6YUdsbWRDMXBiV0ZuWlMxeVpXZHBjM1J5ZVM1emRtTXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRRERUdktoRmZIR0g4eEw4eC83ZUVIaUJJMGszZy80bFdlYQpGZWc1cjliME9CZVR0VVAydTF5WVNockNUeGlvd2NGRGFSazFlNUNkVmhZM2lBcm14LzhpbHQ3UGwrV2o5ZVlqCjhPTGZsZ2M4TWxoZXg3dXQrQUY5RGtSM1hZd2ZDYS9rYWVDYzJTSGlUVHRzNkNBRld5Q1NFVFRSdmF0WStuc3oKVm90NGsxNlZ6RlVMa3ZxN3VMRnp0WDRxaTBPVitrUlZucXlCb25vOUhhSkl4d2Y2WmFiUjdRamlQbGZwTmx3NApKOVYycXU4K3FsNTNEQkxtYkpHYWo0ZWtxTEsvRzVhSldFSzZsdUJzSm9uSklYWmw1RzYrR28rV2xLS3ZBZUVmCmQ1bll3YUdqWTR0bmEzbmRUMWVRaHB0OTA3ZHFlWEd1cnc2Y0FtendLUzA4VG9HSVB5aXBBZ01CQUFHamdnRWgKTUlJQkhUQU9CZ05WSFE4QkFmOEVCQU1DQmFBd0V3WURWUjBsQkF3d0NnWUlLd1lCQlFVSEF3RXdEQVlEVlIwVApBUUgvQkFJd0FEQWRCZ05WSFE0RUZnUVVTTDhIWUV6cmNDRXZqSDV5bWN4UlBmVDBiMUl3SHdZRFZSMGpCQmd3CkZvQVVLbW8wOE1QQy9vWDNMVkhYdzRmNWlvWXoxMFl3Y1FZRFZSMFJCR293YUlJcmFXMWhaMlV0Y21WbmFYTjAKY25rdWIzQmxibk5vYVdaMExXbHRZV2RsTFhKbFoybHpkSEo1TG5OMlk0STVhVzFoWjJVdGNtVm5hWE4wY25rdQpiM0JsYm5Ob2FXWjBMV2x0WVdkbExYSmxaMmx6ZEhKNUxuTjJZeTVqYkhWemRHVnlMbXh2WTJGc01EVUdDeXNHCkFRUUJrZ2dSWkFJQkJDWVRKRGxpT0RSbE9UaGpMVE0xTldZdE5ESXlNeTA0TUdGakxXUmhPRGhtTnpSbU9HWXkKTlRBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWp3TlYycUZvRlM1QmhJUklXUXZXUWhlZUlGSnEwVFhoeG5BdgpYTFFxd0JjM0NtTThhU0d4L2MzbXZHWjhpV2dCSDVyNEVETWE1ZE1HN01OdUF3RTFlRUVTU0J1TTRUbURQRmR6ClRDcjdmUk1BN04zVlM3K1YzQXdGNUdwNUlua2hseWtRcGxTNGY0WmJGUkZPTFgvMzkzNXc4QzNFZmdrZVJjV2MKMFNjMlFjcjJ3Um1xYmdxdlU2SFBnYTVZVVhWNGMxSUsyeityUkZXY3VLT2prRlRQUGRQaXZrWEZ0RVNsc1hiTwo4WEVPN2VnM0NtMHBlMTlEc2l5S0NOT3NmYlN6blFUSjRUVzlPR0hJdDlrNFRDMHhURll3R1MvaGxPdTF0TVZuCmF4eHNyUEFuVEtzck5zUUx6ZGZQc2VLMCtuMmQwOVR1bmpoL1VuVm1xV08wTnhaQ0VBPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUllQ09SUnRuSlFvOHdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpnNE1qQTNNakFlCkZ3MHlOakEwTWpJeE9ESXhNVEZhRncweU9EQTJNakF4T0RJeE1USmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTRPREl3TnpJd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFDbWx6d1NBOVc0N3VCcEZQR0l0Skh4OHQ5a1h2YnNsUldMCmRVSGI0d0x6WTNIcm5HenJyWmE0SCtycnExMHpvVG9kVXhQMWZObWYraElwTEJ4QWxiVWhqdkZ2bjczUDkybisKRmhVTGtDVjNFVFRQbFZCTWsvbVdJazliVU5Sbld0Z202YlFpTUlFZFNxSXdkOTNWYnNqNGREK2VBOFIrMnFZQQplZml6VGl1NFR5RVloSVFHV0E5MGFOS095cGZXbDc2djFzTFFNRHRCMTQ3UFVxb2NNOXhGSzkwSFNObGxJR2dzCjJwT3lCdUtrdXJ0a215bXE5MDdKWVZxQWxGV011Y2JGeEZFWmxVZE0vMUMrQTVEME1FWHNzdVZtazF6RzRVNjAKK0ZzYTVGamFBODB1N2UrRnN0MGoyQW44WGhHWExnVnU0KzFEVHplaVFNdHZSclNvOFhFdEFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUXFhalR3Cnc4TCtoZmN0VWRmRGgvbUtoalBYUmpBZkJnTlZIU01FR0RBV2dCUXFhalR3dzhMK2hmY3RVZGZEaC9tS2hqUFgKUmpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQUlWZGhUSkF6K0gwL0VVL1dNKzNaUkx3NlZPNVhkM0Y3aTlidApDYUdaKzUxQjVMYU9INVZLV2R5cmdOMEdvMEMzZDZtcEFKNEhqMFcvM21ZVnU3cStUQzdYNGF5WjNHM3FwR3VaCkFzcDJQWHI2RlhCYUEycEg2S2t6NVNBbXhHNzMyVS9WZFNjMGRJUEV6SExkRmxHTVM2aTQzZk00UjdEU1dpWSsKckRHanZNL29uQ2VZczlWSFk4a25jT043R2tkUDk4QU5yNGVJQmRHZnFRRGY5Y3UvbGxBd2JPQWNJdWJsQmNZMAo5dkliVXJ4SjA3R3hDb01EUkpONFRCRzhWY1NsVksyTzNQSGt3VXdZTkFuNzFTTGRxWHJMZEwzV2xhamNtYWYrCk55K21tbzk3VlpFS2U0SkY4VXhSVGlZU0hMSXJWK0Rzemo3aHZKcnNNKzg5ZUJjcldnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T18:21:19Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 9b84e98c-355f-4223-80ac-da88f74f8f25 service.beta.openshift.io/expiry: "2028-04-21T18:21:19Z" creationTimestamp: "2026-04-22T18:21:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"9b84e98c-355f-4223-80ac-da88f74f8f25"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T18:21:20Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 9b84e98c-355f-4223-80ac-da88f74f8f25 resourceVersion: "7234" uid: dfe5f141-6cf3-45a6-b713-3decb1e8e442 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-22T18:17:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-22T18:17:29Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "3671" uid: bcdbf545-fa03-469f-86a3-1d1823108116 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-22T18:16:48Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-22T18:16:48Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1742" uid: 8ba5e08e-4499-493a-b3bc-55084af40a77 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-22T18:17:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7d643aa3-3105-4a30-bc26-5d4599ed589c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:17:00Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:17:29Z" name: node-ca-dockercfg-c4q6z namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 7d643aa3-3105-4a30-bc26-5d4599ed589c resourceVersion: "3783" uid: aedd505d-aee1-4b6c-aa8b-1f4a8c6b5075 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-22T18:17:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"91fa7a69-61a7-42ed-ab0d-f853ddb41035"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:17:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:17:33Z" name: pruner-dockercfg-znjrn namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 91fa7a69-61a7-42ed-ab0d-f853ddb41035 resourceVersion: "4050" uid: 79cbf243-4aa2-4e60-982e-6b1b2ae8fe4d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-22T18:17:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ae66537d-cf49-4a4b-ad4b-636c02ec2f08"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:17:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:17:33Z" name: registry-dockercfg-4bvf4 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: ae66537d-cf49-4a4b-ad4b-636c02ec2f08 resourceVersion: "4051" uid: 450b0dff-b08c-4d78-9b62-3c325e5d8304 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "10950"