--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T14:26:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:26:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3ca3a29c-e6ae-4844-81f6-4d24610a98dc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:26:37Z" name: builder-dockercfg-z2crd namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 3ca3a29c-e6ae-4844-81f6-4d24610a98dc resourceVersion: "4216" uid: cd6ce0e8-6db9-4039-a867-8a8d8a7d8ea9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-16T14:26:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6b06263c-2a2a-4ce2-a460-c7029d385668"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:26:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:26:32Z" name: cluster-image-registry-operator-dockercfg-kp9wn namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 6b06263c-2a2a-4ce2-a460-c7029d385668 resourceVersion: "3621" uid: f0013ffa-1298-4234-ad40-3bd91c90fd88 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T14:26:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2e6828f2-8a5d-44c8-9355-6f1abf5259ed"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:26:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:26:32Z" name: default-dockercfg-vlkcn namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 2e6828f2-8a5d-44c8-9355-6f1abf5259ed resourceVersion: "3625" uid: d3c60195-6fde-4340-a6ad-38bdc3f5fe3c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T14:26:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:26:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2784d93c-775c-4cc2-9efa-36cec2fc332d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:26:37Z" name: deployer-dockercfg-cnmg7 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 2784d93c-775c-4cc2-9efa-36cec2fc332d resourceVersion: "4212" uid: bce96c4c-a4a9-47fc-bcdc-a628f714d91f type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:508ab0206f94ff05f8cbe544a0a4861674f1b9f642d65a25c7c554bdafeccc80 creationTimestamp: "2026-04-16T14:25:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T14:25:58Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1954" uid: 8bcd3e1e-d134-4592-9ff3-2c5568d94d88 type: Opaque - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVFVENDQXZtZ0F3SUJBZ0lJRUozWWJjOFlWZ2N3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qTTBPVGt4TWpBZQpGdzB5TmpBME1UWXhORE14TlRoYUZ3MHlPREEwTVRVeE5ETXhOVGxhTURZeE5EQXlCZ05WQkFNVEsybHRZV2RsCkxYSmxaMmx6ZEhKNUxtOXdaVzV6YUdsbWRDMXBiV0ZuWlMxeVpXZHBjM1J5ZVM1emRtTXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRQzhFT1BCRlNvMGJRSVpmK21GcitaMjVaQ2NkdzI1V3kvcgp1ZXNTZVV3MHVDOGM5ZHAvWHBHR3dSeXdxaklWUUdvYjhGOTlwVGJ5UVl2WUhFeHEzelFkd2FHRVZOSFduV1ZzCnNIQnAybWRwK3NkR3J3UEZwc0IvVnZ2NnNjRHkrdDd2ekllUjdXa2dtR0F0L1hyK0xjdmVjdHc1Uklpa2xwK04KK3dlK0d3Nm1TRC93Zk8wQkdhZlFCOW5YYXQycUZXQWJsQzQwZkJ2Unlvc2xBdFVkK1F6K0NXckdhUVRReVFsawpObDNVMHNvMVVZU3p4R25aUGtGM2ZHTGxEL1FScUg0Y2c1SUZRTUIyZndGMnM2WW41eTluS3FBcHkxcFNVRDRTCnRnSHYwc0QrMjNrcHR0S3loZDlMbmd1YmFpOFUvNEF5SHpEUmUyTklyb2NEcER5dXJ3dVpBZ01CQUFHamdnRWgKTUlJQkhUQU9CZ05WSFE4QkFmOEVCQU1DQmFBd0V3WURWUjBsQkF3d0NnWUlLd1lCQlFVSEF3RXdEQVlEVlIwVApBUUgvQkFJd0FEQWRCZ05WSFE0RUZnUVVwVTRxSm9aWHR2U1pHZ3FBdFYvSVkremZGRnN3SHdZRFZSMGpCQmd3CkZvQVUwMW9mWEhMa1NPT2lsTVU1dW9hYzU3U1kzOTR3Y1FZRFZSMFJCR293YUlJcmFXMWhaMlV0Y21WbmFYTjAKY25rdWIzQmxibk5vYVdaMExXbHRZV2RsTFhKbFoybHpkSEo1TG5OMlk0STVhVzFoWjJVdGNtVm5hWE4wY25rdQpiM0JsYm5Ob2FXWjBMV2x0WVdkbExYSmxaMmx6ZEhKNUxuTjJZeTVqYkhWemRHVnlMbXh2WTJGc01EVUdDeXNHCkFRUUJrZ2dSWkFJQkJDWVRKRGcyTVdJM1pHTTFMVE5oTUdNdE5ETmpNaTA0Tnpsa0xXRXlNak14TVRobVpUa3cKT1RBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWF3WnhWZk5pM1VYajN5cnlNU0YzUm5YT00rOHM1OTBlTWxkNQpZMmw3cHBrZWY3RjQ0U1BkNmk1UXZhSVVqSXRMdkEwV2Z5SnVzSHEyT2QxLzZuSGxDY2VRNExwa0UrUWlqcHFQCmhQQjQwZDlramJ6RHlnM2xkS25XMGlpK3pZckthY3FINmNNVDB6eTQ3ZXREVDJmMVBHQW1VUmZxRHd0OTA1Sm8Ka09rNUVSRzRvRzNvRkZ3U1hUc0RTN20rRUsrcWh1Wks3ZGlNN1M3VE9BcFM1TjZ5L1hkeksxQjNkV3ZiaUxqWQo2aFFrOXloT010NXdCdGMvRUdkL2IvQU9yM3EwdlpMT3FuTHJwS05oczgzSUtlS3BMNlJxTVZMZDBNRU1jUVlRClZISHB0QkxoY3BWZ28wdWJZdDEyemhURi9CNFFYRitTeWNnbExsLzJsUVltTVcycjRBPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUllTXBMRTJ3eVZFMHdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpNME9Ua3hNakFlCkZ3MHlOakEwTVRZeE5ETXhOVEZhRncweU9EQTJNVFF4TkRNeE5USmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WXpORGs1TVRJd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFDd29ucmFIL1ZNSHdUYitOVXZQUFhhNVdNK3BURitXcTM3CnJvWnBGYy9nQzhhM3c3bWFRc0tyWXdpSjhEcHNvMkwvTG51ZURocEtISE9tOEZXTVlzNUpXb3ptdlVCZ0M2dlkKU1M1TDlJRnArQUs1d0JtYkZ1anBWa0J1NXpON1pha2dPN3dMZ1E5d0x3bjZWVFFudVUzWThwSSt4OUorYXk2bgp0dlBCWHNhREZwT3V6SlFNRkVrZmpVV2xPZTFWZ0VJenBJOUxlMWxkWDNobUx1b0tVd1FCditWTW9UUWUyYmhhCmEzRTNjeVVLN0VSM1BFOWllUzNQNXBwb2Z4ZWg0bk90SndKeXZwWkt5Q0FmcE1UZWFRbzNkZm5NeEhMK3RuOXEKTWFBekNNbmFheG04RVlKVk1tWGdQQXN3VEdiVFdjVFk0NGxRYStWTTRzN3VnSmlhaWFsekFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCVFRXaDljCmN1Ukk0NktVeFRtNmhwem50SmpmM2pBZkJnTlZIU01FR0RBV2dCVFRXaDljY3VSSTQ2S1V4VG02aHB6bnRKamYKM2pBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQU1ocWVtRkYrKzVNSGI2blloZDNIS2c5ejV5cTVEaFhUWVJnMwpoRThrcmNHVmhkditnamd6dHZ4ZGt3OHZ1QXZHWEtQdkY5eEJyNy9FbDRuV0dHRWVDOUNMaGZ5SDZNNDFKei9TCmdpUTJiYWh5NFhNbm9MQU1Rdld2SGFMSGhaY2dYRE5oVVhuZytwQlphZDRvMjdZeXRiM3gzUnR2K2NNMUhPazEKWUsyTTNQNDVlYm1kUXJCU2Y3QUo2VkhnYm5rcnhIalhoWlBzZlhtNDdmR3lFWHN4S1lDOS9LUjFEUGtObjlVUgo0eWQ5emVudVF4NDN5SHhSVm84Q0hheU1FbjJjNXVuYWJYdmVJWDI5ekdqZHQxVm1UQXd3L0dmWXc0cXVJc0tFCnNVWjFwc2FZejNISFYxSStycks5bHA2RGN6OFJNVnRHSktPRVloWS8vM2JQbEFVOFB3PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T14:31:59Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 861b7dc5-3a0c-43c2-879d-a223118fe909 service.beta.openshift.io/expiry: "2028-04-15T14:31:59Z" creationTimestamp: "2026-04-16T14:32:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"861b7dc5-3a0c-43c2-879d-a223118fe909"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T14:32:00Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 861b7dc5-3a0c-43c2-879d-a223118fe909 resourceVersion: "7687" uid: 390e00b2-c5a2-48a0-881e-b57b5e4e1639 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-16T14:25:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T14:25:58Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1952" uid: 1ba67c21-560f-4898-aec2-a75e94c7da27 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-16T14:25:56Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-16T14:25:56Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1701" uid: fae9f4c7-ca7f-4d21-b2c8-ed438dabb984 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-16T14:26:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a447f0a7-0abd-4c88-bb8b-7f783b7c2302"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:26:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:26:32Z" name: node-ca-dockercfg-ddxcq namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: a447f0a7-0abd-4c88-bb8b-7f783b7c2302 resourceVersion: "3631" uid: 6e9ca077-8e8c-4171-97be-f74f452feda4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-16T14:26:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"befb9d10-61a0-4096-8794-a6a29eb5855b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:26:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:26:32Z" name: pruner-dockercfg-b7scz namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: befb9d10-61a0-4096-8794-a6a29eb5855b resourceVersion: "3632" uid: 13461b4e-8abd-4a43-b1ee-6577b7f9af0d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-16T14:26:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5bd1d4c1-cd44-49ca-85d4-53516e76418f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:26:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:26:32Z" name: registry-dockercfg-r52pv namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 5bd1d4c1-cd44-49ca-85d4-53516e76418f resourceVersion: "3636" uid: 5478b828-ee92-460a-8b9e-5cc930f1b477 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "29452"