--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-23T16:31:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d28a1e89-0427-4365-87d6-828dca86d458"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T16:31:38Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T16:31:39Z" name: builder-dockercfg-7spdt namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: d28a1e89-0427-4365-87d6-828dca86d458 resourceVersion: "3253" uid: 4a7254d1-0fef-406c-b064-f37fcd6accb0 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-23T16:31:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T16:31:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"28058e51-be48-45f5-8253-8e93e2db499e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T16:31:34Z" name: cluster-image-registry-operator-dockercfg-bcxm2 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 28058e51-be48-45f5-8253-8e93e2db499e resourceVersion: "2691" uid: 33d44490-f111-49ae-955f-41488de88613 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-23T16:31:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T16:31:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4031245d-897c-40b7-bd54-217eaecc7cca"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T16:31:34Z" name: default-dockercfg-9hdsg namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 4031245d-897c-40b7-bd54-217eaecc7cca resourceVersion: "2695" uid: e594920a-7d52-46a5-b6e8-aa30737b70f2 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-23T16:31:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9d63b1eb-7832-4562-b79e-8b6067fa6f1a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T16:31:38Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T16:31:39Z" name: deployer-dockercfg-zw9xq namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 9d63b1eb-7832-4562-b79e-8b6067fa6f1a resourceVersion: "3255" uid: d401fa56-1245-4006-8a37-abbc323f0f8d type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:e93954a80e513afdf87123409a26043938c23a71c4c32de138e2c330c07ce3d6 creationTimestamp: "2026-04-23T16:31:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-23T16:31:20Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1846" uid: 7d62786e-15e2-4387-8f7c-68828bd87333 type: Opaque - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVFVENDQXZtZ0F3SUJBZ0lJWHJHWXY2S3JzZ3d3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qazJNakkxT1RBZQpGdzB5TmpBME1qTXhOak0zTkROYUZ3MHlPREEwTWpJeE5qTTNORFJhTURZeE5EQXlCZ05WQkFNVEsybHRZV2RsCkxYSmxaMmx6ZEhKNUxtOXdaVzV6YUdsbWRDMXBiV0ZuWlMxeVpXZHBjM1J5ZVM1emRtTXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRRFBqRjY1ZmVERTFXQituQ3cxZURFTHZIekkyUlJSaS9BOQpLZmpVRFQ0U21rWVhOMmROc0ptQVhUOHJwK0Z6bkJ1MzVZMW94VlVIYlJHNGJETnY2NFZJYUxQUEtyanVlT213Cll1N1NiWTFoQTBlNy9vRHVBdnVrOEJtRTl4TmVuYkxTKzBCdjd5ODYxNm9ndTQwenN4RkZyYkdrUklSNUdYMG4KSG52em9sQjFpaHFMU3k1QTZCNFFiN2trSDJHZUdUYXZKc3RMSExBbXVQaXQzN2hHOHcxVWNUeUM1TldCU2ZWNAo3dnJkLzNualBRakRlS1dLS3I4a01PMTBtSUNkaE1SSHVpUWp3TGtnNmQwYXo4Ly9WS3dSWUxDbEI1SWl0V1YyCkROeXJYVExIWlkwZS83TXR6L3FxbW9SVjlyMUU4UGtSRU4zQ0MvSkMrNUI1Ui9pNndoV3ZBZ01CQUFHamdnRWgKTUlJQkhUQU9CZ05WSFE4QkFmOEVCQU1DQmFBd0V3WURWUjBsQkF3d0NnWUlLd1lCQlFVSEF3RXdEQVlEVlIwVApBUUgvQkFJd0FEQWRCZ05WSFE0RUZnUVVobUdiVFo4elNWNllFVm90V05Db0JQaVVkN293SHdZRFZSMGpCQmd3CkZvQVU0L3FDMWpZallFbXFOWVh1UDdGeUhpRjlrdXd3Y1FZRFZSMFJCR293YUlJcmFXMWhaMlV0Y21WbmFYTjAKY25rdWIzQmxibk5vYVdaMExXbHRZV2RsTFhKbFoybHpkSEo1TG5OMlk0STVhVzFoWjJVdGNtVm5hWE4wY25rdQpiM0JsYm5Ob2FXWjBMV2x0WVdkbExYSmxaMmx6ZEhKNUxuTjJZeTVqYkhWemRHVnlMbXh2WTJGc01EVUdDeXNHCkFRUUJrZ2dSWkFJQkJDWVRKR0V4Wm1ZM01XVTRMV013TlRFdE5HWXlPUzA1WmpRekxUYzVPR05rWm1RNVpXWmoKTlRBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVdpMERrQUtTL1JhRC84RkVUcWZ1T3dXWEJBcVNncmFQOWRmaAptTURvcWMyeFpmNEVxc2E2QVd4OTdsSFBkaUVBMnhxVmlMOVo5VjFNZk9jUU5uMDhaYTI2SlpPQm1pdkhGbWs5CldhWmI3Y3ZwTHowVlEvWUxOVzlsUU84cXl1eGNmaUFPVUNQOTVQL3VPUnVMZGc5cGdGOUJncTNXTHRjQWFFRFYKVmgvcVRBNFR6NWtvUHo5UEY3Q0dpQ0pCMG0zQlVzS2I3S1pFNmNKQlE4WnpqVkFKSHAyTjJIQkNVSGtBK29TNgpFSzhKM1pRU1JTZUJyd002Vnl1bmdBck9tU1BNWTF5a3JWKzA5eklBVGgxdC9ZbUhmSG03WjhrcXdHMy8yWDB1CkpXZURuMXpkVW9PLzcrdkhndVowcGpHUDRVeDIrRWk5bGJtQm5ZWWlQUTliT2JKVHpnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlmWFVMRlRkaldvd3dEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmprMk1qSTFPVEFlCkZ3MHlOakEwTWpNeE5qTTNNemhhRncweU9EQTJNakV4TmpNM016bGFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTVOakl5TlRrd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFEQ3ZzTXNFbkwrWnhnL2wyNlFlTzN0Ym1wbi94dHdUTnpNCm5RbnFjVDI1Y25wQ1NFbSs4TkVvVUdqbFFFcTlhdTJzM2lXMG5QQ09qMy95YjJpWXg5cEppZkdZc0Y1cXd3aUgKNFRISVFzQllHY25NVDJpMUQrQU5JTlhZZ3RYVUtvL0pjVTJ1eTgxQlF0c2R6U1djUTRaSkppbEVPNFp3VVpKcApIVC9SSXdvdDdQb1h1UE4rSVdyaVhIMlJyaDg0dVFDM0Y1VDlWOVRaejJjMDZSVlNQbW5ScG9OR1Zpc2k3YkJjClpXRzZSOWI4NUVxQndvcG1DMkJVQlpVS2w4UDdsWHlOYjZET3FjRUw5UnQvd0tlcGNjTXpNQy8xQ2M5T1FwUUsKUlhqNXhRTHlaeDBnbmh2M2YxNnF6eEc1aEpQQTk4YjNpZS9uSm8yOG45aGVCUkhZc2FYREFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCVGorb0xXCk5pTmdTYW8xaGU0L3NYSWVJWDJTN0RBZkJnTlZIU01FR0RBV2dCVGorb0xXTmlOZ1NhbzFoZTQvc1hJZUlYMlMKN0RBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQW50TWpOUFVkNHVndDU3eWVUdDFlRERjVUFYRktWVzNqTlp2dwpxdTFPZHprUjdzSWQ3WHk3WWtzUk5IYzdVZFJwOGZmaW5HbFpBM0t1SW1IR3FTa2k1RkZUdTN0YXNkWHhQaXgrCkI0VFArdWtkSytkdWk1QmNyVDhDbmZIQjRMUCsyL1l2WjV3Mmo4U2d4NkhrK1YrRjg4UU9pUTE1bEwvTmhPaVYKUW9aUmxGb2Vzcnk0NVNhOEJPdzdhTW90em1JSVNsak5sZUIwY1pvS0RWenptTytkQWkvM3k1azh4bDREMkZvKwpmQmNKZGZpK3RpM1NSMWpKeEpWMWlvc1J0aDR2dFJxdVBPVnVDTFgzNmdiU1RzNC9hb0dwN2J3T0tzY290a0JDCk1icExoQ20rZTk1Z3o0eGJYMDN6bG1wZmRoeTV2SUxIM1JCMUhYNnpSWWtkV0thN0tnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-22T16:37:44Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: a1ff71e8-c051-4f29-9f43-798cdfd9efc5 service.beta.openshift.io/expiry: "2028-04-22T16:37:44Z" creationTimestamp: "2026-04-23T16:37:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"a1ff71e8-c051-4f29-9f43-798cdfd9efc5"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-23T16:37:45Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: a1ff71e8-c051-4f29-9f43-798cdfd9efc5 resourceVersion: "7728" uid: 15bb154d-05f4-4d18-8af3-7699e2ef876d type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-23T16:31:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-23T16:31:20Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1845" uid: 902af738-98fc-4f3f-997d-eb0e11642b67 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-23T16:31:18Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-23T16:31:18Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1753" uid: 08c71868-294d-4619-8064-a0590bfdca1b type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-23T16:31:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T16:31:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"776a4860-ee9f-4e57-95bb-3d7d467b4e58"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T16:31:34Z" name: node-ca-dockercfg-2tgsr namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 776a4860-ee9f-4e57-95bb-3d7d467b4e58 resourceVersion: "2700" uid: e7d22b4f-4b17-4c8c-947f-7ca899c22ee0 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-23T16:31:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T16:31:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7939b6c3-8fad-467b-9998-6182da66c7da"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T16:31:34Z" name: pruner-dockercfg-2d6kn namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 7939b6c3-8fad-467b-9998-6182da66c7da resourceVersion: "2705" uid: d4150209-e8ef-4849-a818-3552668300fe type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-23T16:31:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T16:31:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"01926fde-f443-484d-b7fd-7f5458754fd2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T16:31:34Z" name: registry-dockercfg-x7fs6 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 01926fde-f443-484d-b7fd-7f5458754fd2 resourceVersion: "2716" uid: 3f6f32b3-d7f8-474d-a31a-b45c18d427a0 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "36780"