--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T13:28:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a5537f08-7c4a-4ed9-8a5d-b7321cd7460d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T13:28:23Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T13:28:24Z" name: builder-dockercfg-qpw7r namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: a5537f08-7c4a-4ed9-8a5d-b7321cd7460d resourceVersion: "3848" uid: 6d1ff007-a738-43a1-bc07-4f68f07d104c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE4OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-20T13:28:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T13:28:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"57162137-632c-4d74-9711-91c54bcd3648"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T13:28:18Z" name: cluster-image-registry-operator-dockercfg-grnzs namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 57162137-632c-4d74-9711-91c54bcd3648 resourceVersion: "3222" uid: 186189ad-78aa-4039-b75f-204f71861511 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T13:28:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T13:28:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e077edc3-328b-4eaf-9928-7dac4623b978"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T13:28:18Z" name: default-dockercfg-8wdt7 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: e077edc3-328b-4eaf-9928-7dac4623b978 resourceVersion: "3231" uid: b148b2a9-c9ca-4a01-b186-f521360f80c1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T13:28:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8d5743dc-c310-4563-b5eb-770299582f3c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T13:28:23Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T13:28:24Z" name: deployer-dockercfg-6pg8n namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 8d5743dc-c310-4563-b5eb-770299582f3c resourceVersion: "3853" uid: 611af5f7-b95f-41b3-90b9-68deb1405753 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:cb6681eaf4092a4ede8b3aff8782aa9cdc8865620719b1fa1aa8d0e0bfc2b42b creationTimestamp: "2026-04-20T13:27:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-20T13:27:59Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1947" uid: 2048e0b3-52a5-41f5-9cd0-06150af91227 type: Opaque - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVFVENDQXZtZ0F3SUJBZ0lJWm1jZXVwSE10S2d3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qWTVNVGc1TWpBZQpGdzB5TmpBME1qQXhNek14TXpkYUZ3MHlPREEwTVRreE16TXhNemhhTURZeE5EQXlCZ05WQkFNVEsybHRZV2RsCkxYSmxaMmx6ZEhKNUxtOXdaVzV6YUdsbWRDMXBiV0ZuWlMxeVpXZHBjM1J5ZVM1emRtTXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRREtEbjk4cHByU3lPR2N0YjFLcnNnbkNvRUl1TjRFYTJWQgo4Tmg3Rk15UXhEeVRjVmV2UWI2MWMrc0N4b1picXNRS21sYjRrUUtUek1PRUs2cjZVbDJMdXl3dk9KWFpPVW9wCnhMUmlwb000TDhHSno2bDZSYmU5VUZVVElQaExnMW9PVUFJendJTEREVXZzVmlMSHArdzlpQXZXUDN6ZjdSUWgKV0tMaURoY05PWkVyZk9HU3IxZ0R5U3NIWFNaU1dNK2tta1VpRU1OTVZaeFBrdTNGd1BPcjUrUDdLdXM3dUJ2WgpKWW9xOGtFeDMvOUNyN2tXR1YrTnpxOWJBdG9PNUFoWWVQbWNMcGlVQ0NSNXF3dklCWjBGelFOOG5VRlN1T3kyCldLWFN4YlcyY2RDc2hrVWppTE9QWVJBRTIxbHRiSldXU0o3dHZ4V05EMGxYVW5oYUtCMGRBZ01CQUFHamdnRWgKTUlJQkhUQU9CZ05WSFE4QkFmOEVCQU1DQmFBd0V3WURWUjBsQkF3d0NnWUlLd1lCQlFVSEF3RXdEQVlEVlIwVApBUUgvQkFJd0FEQWRCZ05WSFE0RUZnUVV4SDJUblJuYllHLytQaDlqNnJsUDB1RU95bXN3SHdZRFZSMGpCQmd3CkZvQVVMM01EeVhtZ0pOanZUMFdmdndKQWxTblZxU0F3Y1FZRFZSMFJCR293YUlJcmFXMWhaMlV0Y21WbmFYTjAKY25rdWIzQmxibk5vYVdaMExXbHRZV2RsTFhKbFoybHpkSEo1TG5OMlk0STVhVzFoWjJVdGNtVm5hWE4wY25rdQpiM0JsYm5Ob2FXWjBMV2x0WVdkbExYSmxaMmx6ZEhKNUxuTjJZeTVqYkhWemRHVnlMbXh2WTJGc01EVUdDeXNHCkFRUUJrZ2dSWkFJQkJDWVRKRGsxTUdJMllqVmpMVGswTXpJdE5EaGhaUzA1TTJRekxURTFPRGc0T1dNMk9UbGoKT0RBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQUFZQWJ5RU9Dd0Z6RHM2ZTl5eERpcVo1RzVUcDR1Q1pWNHlHRwpDUVRSZUF6b01rWVRSN3U1dlR3Um9VL1ovajkrSm5YckRVMldyZ0Y0UXVUaFN4QTdNcnAzVHNlS1BCYlM2ZXlMCmpNN09YUUxnWENtRndqcGtxQjFYcURENjV3emtYTHVrOVFxNS8rZ3BTZ0lsc3RKR25GakdsU1pvUGlFQ1VyK0EKNEg2MHNnRHBPNGVnS20wOXpHNTNsTkE4R08xL0E1c1JMZlpsRzVvTDQrQ2pBVVhMWmJRcCtBNldyZFp1UnlqWApUVUJ0Z0wxaHUyNnM5ckc2a3NKdU5nb0Mvajk0bkV6QlBaRTJ6KzZKTEdVdlB3T3d1R3NZdW5aQTM3SklYVzdwCkJZRlUxQlhsbXFBbWJsMXZNcFlGQmU2T2ZYb1dPL2V0Sm5xSndrdjM3QWVpM3RKc2V3PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlPU3RQeFBQeXBDMHdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpZNU1UZzVNakFlCkZ3MHlOakEwTWpBeE16TXhNekZhRncweU9EQTJNVGd4TXpNeE16SmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTJPVEU0T1RJd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFDd1ZtNVhiMjZQd08rN0pKamExeDVueitkRW1RQUpka0xSClpPVzBHVHpCeFdYd3pwamZjdUFwRU5nWk5jejdqdHJtSjgweDNhd1hLeGo3blNEM3ZTMFVqUkxyNjdwZi91ajkKY2Jna1p5d0htY2NBMjI0dFFoL0d3NW1YYzd0dUdIU20rbUxhejA0Z0Z2dUpabWd6NTNucG9BWEltU0E3Z0JMMgo2Q1JielJPamYxakJPa3RIQkhndG5lZjNmMTQySjlrd09ua2czWGZTRTBhSEE0a3B4YUFkSFE2Zjl5eUUwWG85CkRKYXBaeEdsSjcxVDZnR2FFS2VFNTlOdDMvRmtRVWhDcHRDRWVOYURrL0hLQ2hEdXNaUlo2c1JOTDhmcGN5dXMKZHl3bEFmTFh4eXU0NDNaODVSR1pHdUZBQVJQN0FoNThWUm1PQWhWajRlY3VFUFdrb1VCVkFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUXZjd1BKCmVhQWsyTzlQUlorL0FrQ1ZLZFdwSURBZkJnTlZIU01FR0RBV2dCUXZjd1BKZWFBazJPOVBSWisvQWtDVktkV3AKSURBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQUdweEVQaE1ZUnU1eWF4WXh2cXZ6RkdhRGJNSEdSNWU4RUp5TwpNMWxraTlNMmwyV3BYa1JOejJXdHA5Y29YdVVZM3AwZ0lTbU84anhWV1YxRkhDRXczZG1LSXNlUDdDdEhIRUk4Ck9Nb1FpYVVRdHhhYXo0WCtJNXdSdVNiaVJnQzcraStFOUxmYnNxeGhiUWw4a3oxMW1BZzQ5RThIN0NsRFl3R1UKTFNMQlZmNlhhZVRtQmd4c2FFZU5uRDZhc3RwLytnOG5ibkY4SnBWT0tnQWYvNmMrVjdwZmdQQ1ZsOWhXd2I4ZgpxSkpycUx0V0xCN0hNMlB1NUVtMTgzV0NINWU4ekxMSkpxVXRYZXBYdEtsYmtBSjU1aWIzVW0yQVgrTGN1WVVTCld4VHFvNTlVSUNBY3hjR21zM0lGUVBSWWVlZ0VQblNRUGpCWFhiUDNjd3RBamJmWnZBPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T13:31:38Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 950b6b5c-9432-48ae-93d3-158889c699c8 service.beta.openshift.io/expiry: "2028-04-19T13:31:38Z" creationTimestamp: "2026-04-20T13:31:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"950b6b5c-9432-48ae-93d3-158889c699c8"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T13:31:39Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 950b6b5c-9432-48ae-93d3-158889c699c8 resourceVersion: "7018" uid: 7c962c08-18e3-4711-a369-d74c6c30daf1 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-20T13:27:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-20T13:27:59Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1939" uid: 19c83b20-d3de-40cd-a15f-c4c8c77d1b2d type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-20T13:27:56Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-20T13:27:56Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1701" uid: a0abb713-c3d8-42fd-9d9a-eeb7961e65de type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-20T13:28:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e10b2b4e-8d84-486d-8399-a0a3c9f6c9d9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T13:28:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T13:28:19Z" name: node-ca-dockercfg-54ggv namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: e10b2b4e-8d84-486d-8399-a0a3c9f6c9d9 resourceVersion: "3234" uid: 1c46a8d4-360b-43c8-8be5-f4ade0d9a176 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-20T13:28:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"889d0124-fa37-4996-9e24-519750de730b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T13:28:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T13:28:19Z" name: pruner-dockercfg-chj7j namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 889d0124-fa37-4996-9e24-519750de730b resourceVersion: "3240" uid: 02361bcf-f47b-433c-93d6-335c1fffccd2 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-20T13:28:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cde753ba-435c-4961-95ea-02db470e7d3d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T13:28:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T13:28:19Z" name: registry-dockercfg-xw967 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: cde753ba-435c-4961-95ea-02db470e7d3d resourceVersion: "3247" uid: 42c27775-dd3c-427d-9822-4f12f8ebe330 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "41001"