--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-21T15:58:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1ee20f87-c7a2-4ef7-b2c0-43cb5da1548c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T15:58:05Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T16:34:33Z" name: builder-dockercfg-h4fcb namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 1ee20f87-c7a2-4ef7-b2c0-43cb5da1548c resourceVersion: "42722" uid: 2e0766d0-e804-41c9-a51f-85de856b8c66 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE4OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-21T15:58:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ebefa984-8bbb-49e8-94a6-18f1d59b1646"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T15:58:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T16:34:31Z" name: cluster-image-registry-operator-dockercfg-g4k59 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: ebefa984-8bbb-49e8-94a6-18f1d59b1646 resourceVersion: "42572" uid: 7f5bdc5c-44e5-4656-a0c2-af5b827e05f4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-21T15:58:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f2b0df62-12ed-436a-a6fd-e868e690d561"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T15:58:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T16:34:31Z" name: default-dockercfg-58fzm namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: f2b0df62-12ed-436a-a6fd-e868e690d561 resourceVersion: "42512" uid: 891c5105-76eb-4ccb-877b-f6a195a92ef4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-21T15:58:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"17ceca38-8f3f-4f5b-ac40-52efc049f03c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T15:58:05Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T16:34:33Z" name: deployer-dockercfg-kc5lj namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 17ceca38-8f3f-4f5b-ac40-52efc049f03c resourceVersion: "42748" uid: 7b320e60-9796-4c87-9f79-24238467192d type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:eaeec009f53f3d8cb2a2b867a47f9549271c7542ddbdba235fc6d06b1c72bee7 creationTimestamp: "2026-04-21T15:58:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-21T15:58:31Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "4031" uid: 52533555-3ed0-4f91-9a03-b4df943160e2 type: Opaque - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVFVENDQXZtZ0F3SUJBZ0lJSWhSb0M2REZ5LzR3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qYzROelF6TmpBZQpGdzB5TmpBME1qRXhOakEwTURSYUZ3MHlPREEwTWpBeE5qQTBNRFZhTURZeE5EQXlCZ05WQkFNVEsybHRZV2RsCkxYSmxaMmx6ZEhKNUxtOXdaVzV6YUdsbWRDMXBiV0ZuWlMxeVpXZHBjM1J5ZVM1emRtTXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRQzMwN01nWTdqT1FYS1BFQk4zd2c2UnByZWNIb0M4dFdCdQpLT3VXN095ck10cjc4R2JLeWk5K1h6ZWlFVHlQMTlpaUpGK093ZTBWVmlObGJEOXdTa0s3K3N3enU2RUY4SFRjCjRnVjh2MEw0c2piMTBOUG1FUGJqMS8rZjcxUDhuZWpPczJVTHh5QTNPeGcrTWpONXVJVi91Vk0vcXhONkxGTGsKVGJBMm1Vb3lPTS9sa0JodDdFZUxvcWhDMXFhekFtUHZhK1VyVkFnUGVOTGRzQlByejYwTlg0bVM3UmtvdURyUwpSSlZyZEtZM1R6aWthT1dWMVJVNTh0a2YwSER5SlYwYUs5OFN6b2xmOXM1Vkgvb0ptYmxHRkF0dk8vdlVKeGRWCjJkcVViZ05EMDVDcndYU0ppclVvMk5TUDR0cGpLWHpuWnBWNHp5SFFYSVBlYkRMbTFWVzVBZ01CQUFHamdnRWgKTUlJQkhUQU9CZ05WSFE4QkFmOEVCQU1DQmFBd0V3WURWUjBsQkF3d0NnWUlLd1lCQlFVSEF3RXdEQVlEVlIwVApBUUgvQkFJd0FEQWRCZ05WSFE0RUZnUVVUQUxPSTl1eStOWkRCSitSUU8vNnVPUTRCU2d3SHdZRFZSMGpCQmd3CkZvQVUyZXk5b1dHazhkTWdTWCt1cGowWFFFNVg4UVF3Y1FZRFZSMFJCR293YUlJcmFXMWhaMlV0Y21WbmFYTjAKY25rdWIzQmxibk5vYVdaMExXbHRZV2RsTFhKbFoybHpkSEo1TG5OMlk0STVhVzFoWjJVdGNtVm5hWE4wY25rdQpiM0JsYm5Ob2FXWjBMV2x0WVdkbExYSmxaMmx6ZEhKNUxuTjJZeTVqYkhWemRHVnlMbXh2WTJGc01EVUdDeXNHCkFRUUJrZ2dSWkFJQkJDWVRKR1V5TkRNM01HVTBMV1EwTVRBdE5HUXhZUzA1WlRGaUxUVXhZVFZrTlRrelpEYzEKT1RBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWpNbENKSjJTT1Nvd3BJZ3NkcTcrYlI5cTVIWjhiMC83ejQ5VgpoTHZ0QVR4RFljZHYzNWxHNTBpL3BNOU1qdXRrNzkySWIyWkRGajV1OXZjbk4xRUZVMEs0d3lKTkkweXl1L2liCnAyaEllQUlBUnhqWE9hTVBiTm9UcTcxdUw4OVdtSkxDQUErSXBkVVpsTGwyRlJmQ0kwbHlCbnNtc3JCM3liZVYKYW9QQnRybmJraXgvZThNK1ZUL1ZwR3ZTTXZlaEVFVDQ2VjFvVFJkYitmNDJ4TG5MTmpRYmVwV2lhTDRjWjU4UQp2M0lHK0tETnUrMVFYdTNVaUp6KzlpWS9ZUlZqR2xNNzN6U3I2bVZBQlRmVlVqR0tLTTJrUTVvYnZYVTV1Rk5lCkcrZHppdzhDWVJoTlRUSHMrU1BsK2tKdFgrc2JwYmFZYnppUVJhcGprSlIrUW43NlB3PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlEZk50K3NMZ0NFa3dEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpjNE56UXpOakFlCkZ3MHlOakEwTWpFeE5qQXpOVFphRncweU9EQTJNVGt4TmpBek5UZGFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTNPRGMwTXpZd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFEQkc3dXEwenVoSVFtTlFiUS9reVBReDFXTFIzQkVSZWxGCmwvWHlZVHFlZGt4dUk2bDRONFVyWVd2VXZPQVZJSFJiQnQwSXJWUHdieFlMRSswdE9jUE9UZXF1eTV3NnhybjkKQkx4RG9vdzdXem82MEM3aVN6T3ZJRHJxbVJBMHBQTmgvYzBGdlFLcm5MS2pLTjlha09WR1d5M2RYcWQwa05nTwpPMklKdlJtZENMekRWckpHQ254UldQM05MWDQySkxTL21rZVhMbXhDWE9ZVnRjU2U0T20yT0VtdkpkTWRVWXdFCmZlU2FqN2I5b0w3TzhoUEFKOW1XN0FXN2hKVmdLUUpDcDVVN1FrQ0M2M3VtYW9ad1JiN3RTSWVwQVE2RUg1cEwKNVJPdjZPTGt3NzBUaEM0QmlBdThnQVkyNUxpNzRDempkVE53YnBUZmVIaDZZNlZ2MG9DdkFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCVFo3TDJoCllhVHgweUJKZjY2bVBSZEFUbGZ4QkRBZkJnTlZIU01FR0RBV2dCVFo3TDJoWWFUeDB5QkpmNjZtUFJkQVRsZngKQkRBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQUV4THgyTU43WGszQmFNL2ljOFJMK3ZkT3B4cE1hQ1R5d1R2WgpTdk5rN3NvQmtETVZuTFFNelBpejdoN1AvNzN4dUtuK3Bod1VPaU4wT2lYQWZza0xFVmRFUWF2d1VSQWxxSllyCkN5OFJMcFNuWWVzMHQvMnpXL0ZudkprL2pOYno0SEM4OXcya1A4YkREYUoxOVNSdVo4QzAreHJPRHY5K3VBTlIKMzRQMHBqbFlRcU9JeS9uWXJSbmxCNVorNHJLQXozczcyUit6QmtVQS9QUFpWUUVCcDFJb0ZCWE9ESjA3c2dnKwpmRHZLL1BqcHNzN3JkYlNyenRtZTBoeW91eVkrV2l2OGFvclFlYVNBYUNuRmVPTG4va2dMT0g1QWNxbFVYM1JLCi83N0h0R2RKenlKMG1GQ0o3UTFUUUhMRjlhK2pTTUZLYkJJR2tzY05iSDFTYjRRdVBRPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T16:04:05Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: e24370e4-d410-4d1a-9e1b-51a5d593d759 service.beta.openshift.io/expiry: "2028-04-20T16:04:05Z" creationTimestamp: "2026-04-21T16:04:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"e24370e4-d410-4d1a-9e1b-51a5d593d759"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T16:04:05Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: e24370e4-d410-4d1a-9e1b-51a5d593d759 resourceVersion: "7729" uid: 9ae8b347-f01f-4241-885f-8e3208f23616 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-21T15:58:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-21T15:58:31Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "4030" uid: 087f121b-f8b7-46bf-9813-9562092f7040 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-21T15:57:47Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-21T15:57:47Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1745" uid: 73503ab1-cc73-4808-8504-86743354ff54 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-21T15:58:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9328380d-29e4-42c7-82de-78e7c320db3a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T15:58:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T16:34:31Z" name: node-ca-dockercfg-grrhp namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 9328380d-29e4-42c7-82de-78e7c320db3a resourceVersion: "42506" uid: 1f3f5afa-5d40-47d4-bbaa-64b4648e1ed8 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-21T15:58:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3d00221c-5a82-443a-be08-9cedb969251a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T15:58:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T16:34:35Z" name: pruner-dockercfg-lq72p namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 3d00221c-5a82-443a-be08-9cedb969251a resourceVersion: "42822" uid: 8db092e0-0796-41ea-99f7-6eba601cf3d7 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-21T15:58:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a527b56a-17bc-439a-a165-3bb31f96e335"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T15:58:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T16:34:35Z" name: registry-dockercfg-vqm4s namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: a527b56a-17bc-439a-a165-3bb31f96e335 resourceVersion: "42825" uid: c3ed9a2c-8823-413d-8074-b2132bd08291 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "46370"