--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T15:08:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7650ccc4-86f9-45d7-9e6f-6938f03bcf3b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T15:08:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:44:50Z" name: builder-dockercfg-bv6fg namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 7650ccc4-86f9-45d7-9e6f-6938f03bcf3b resourceVersion: "42683" uid: cc35bc9e-c18e-4318-a431-84a5dd85aa38 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-16T15:08:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9f78fe2c-ea03-4a32-835b-3f8b7bfc9202"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T15:08:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:44:45Z" name: cluster-image-registry-operator-dockercfg-nxhzb namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 9f78fe2c-ea03-4a32-835b-3f8b7bfc9202 resourceVersion: "42478" uid: bc1f623d-785b-4012-9763-1c5a45c65b81 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T15:08:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1a449133-c16a-42fd-83cd-24807dad6eb6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T15:08:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:44:45Z" name: default-dockercfg-sv9dv namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 1a449133-c16a-42fd-83cd-24807dad6eb6 resourceVersion: "42474" uid: 49d686d5-3662-4a6c-932e-639a58a9e1cf type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T15:08:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"04e2927e-71a6-4292-b4a6-531da8b277fc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T15:08:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:44:50Z" name: deployer-dockercfg-qvmx8 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 04e2927e-71a6-4292-b4a6-531da8b277fc resourceVersion: "42681" uid: b0cd7eba-4e70-432f-ad73-842afed50c74 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:d37aceac01524165e8f9463548122722198f2a40cd9962894723a022b384c6e8 creationTimestamp: "2026-04-16T15:08:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T15:08:15Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1955" uid: 5f78fcf1-d73e-4949-897e-b166d66a3589 type: Opaque - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVFVENDQXZtZ0F3SUJBZ0lJVnZnT3UrNndQUDh3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qTTFNalExTWpBZQpGdzB5TmpBME1UWXhOVEUwTVRoYUZ3MHlPREEwTVRVeE5URTBNVGxhTURZeE5EQXlCZ05WQkFNVEsybHRZV2RsCkxYSmxaMmx6ZEhKNUxtOXdaVzV6YUdsbWRDMXBiV0ZuWlMxeVpXZHBjM1J5ZVM1emRtTXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRQzU2SXRSS1NjWGpYSzJpQ3lSVjFRTm43OExWOEpDb0taSApzblRPbG5Ed2l6TFZZZzdHZWtEdDJlRVozblUvc2NWQlFrK1RGb0V0cmx3U29xM05PYjdIL3U2S0tRckdBZXNCCjdVdEppZmNuR3loa0Zwc01PY3BYYXdxVFhLZHNLaG9zb2hYeTYyQjBCN3hRZElHbS9JT09ZeUw4T1pDditTTisKYmZyUTAzbXpVN29kMFZ4VzVqU29jazN0ZE8raUNzRkErUEpjeUMyQ2ZRTk9GS2VsdERpUGJaNzRHalJFc2ZXcwppVWJMOUpmSmJNeEpReUVrb0RZaFJ3YmhncSsxT3ZVeGYwM1FHSnBaZWtTSlVJRitHK2U2N2g2cG55Z0ZoNDQ3ClllNmVuaVZEREs3c1hFMldpTlJZbXRoWVB4MjVkNTVpTjhqOWtValpFaXpEamlhRFFNWWxBZ01CQUFHamdnRWgKTUlJQkhUQU9CZ05WSFE4QkFmOEVCQU1DQmFBd0V3WURWUjBsQkF3d0NnWUlLd1lCQlFVSEF3RXdEQVlEVlIwVApBUUgvQkFJd0FEQWRCZ05WSFE0RUZnUVVhQXBraTdpSmI5UEpNUEVpMU5adEVwSjhheGd3SHdZRFZSMGpCQmd3CkZvQVUwaUpxcnNqbGNFblljcjdqNWowMlZCdUpjVGN3Y1FZRFZSMFJCR293YUlJcmFXMWhaMlV0Y21WbmFYTjAKY25rdWIzQmxibk5vYVdaMExXbHRZV2RsTFhKbFoybHpkSEo1TG5OMlk0STVhVzFoWjJVdGNtVm5hWE4wY25rdQpiM0JsYm5Ob2FXWjBMV2x0WVdkbExYSmxaMmx6ZEhKNUxuTjJZeTVqYkhWemRHVnlMbXh2WTJGc01EVUdDeXNHCkFRUUJrZ2dSWkFJQkJDWVRKRFZqTlRVME5XSXpMVEkyTkRndE5HSXlPQzFoTnpaaUxUWTJORGsyWWpRMk16bG0KWkRBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWdGRlVOZmRycU0xK2hrZ0pmWG5uZFJDbjZjeUQ5MElSTXpuTAo4L0V4S1dLM1ZYd2NYd21JaGJXeUxBN2UrVDVvM3EwRTlvMVlBZzZJQVpOc0dVd0pENE5SZUYwM1psZGtIRVFaCkRYSGtOUnB4NHZVZXFzQjZGNEFoczdBSVFMYVF6QkUyVjFQbFFKWXdsLyt6b2pDMi9vWU9Ja3B4YUdhVGRVNUMKMzBHUEZSRGlJS0lscktwRzNoL01EMGFHLy9SUFg4cDJZTTE2UjVwNXNjMFVLNEJjaUZ0QVZxQVpVRDlHY1FycAo0a01tdjU2UTJFV2paclFFNUVZbWpwYVM3ZG1EUGhWaDkwNGRSTjNHKyt6WGdQTDZNT29KS3VKNDFOejhySGc2CmQzeDVSd3l1bWFUVFVOaWpOeWNveEliZk04RVdNN0RQNzlnMm9KRCtCOU1VUkJZZ3BnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlkcEJKZWhOTTY2a3dEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpNMU1qUTFNakFlCkZ3MHlOakEwTVRZeE5URTBNVEZhRncweU9EQTJNVFF4TlRFME1USmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WXpOVEkwTlRJd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFDcFRVUzdUWng4ZkpxZDRmY3NBZ2ZNMllSZEZUNXBrMHpTCnR6bkRpZWxHYzkrMFA0VEQxSllaa1U2MkdnTnhqWFh5SEoydEJxUUx0TTZlK2Rrbmd6eXc0bllmeDZKTm9NcVAKa1h0MXdhd2plc2tQQ1RQMkMvMmNZdjB1M2JLb1M0cHRqWE9Lb0pQZ0lRZGFqdi9rSEFpWHJGM0RzQjhPZ2tSegozRi9Lb2gxcjBvd0NLcFo3cFBGWWRvK0pVMXhpUTN4NmZ6SkdueGkyRGxlUXZVK0N2akt2UU9wOE5PdlIyZDgrCmllQzJCK0dZK2I2dm5MZ2lkd1M4c0l3WG5QRmVNTzZ1RCtiMEhjbDIxUFBSbnIzd2tPNm5lT3IrQ20vaCswN0wKZlF3U3JLbnlaNDh5UDBUVnZObERiZ2ZvMU1PSEViMEovR0NxRkFhQWEyUHhGcjRQZmRtcEFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCVFNJbXF1CnlPVndTZGh5dnVQbVBUWlVHNGx4TnpBZkJnTlZIU01FR0RBV2dCVFNJbXF1eU9Wd1NkaHl2dVBtUFRaVUc0bHgKTnpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQXBHbnRJZ2IrdzB5T21FUUJ1b1NPRU4xdTJaZGNTdGUxblhhUApaVytMT3VpeUdkZjdZa3E3S2MyOS9SeXg4OVg0a2dQT0pwYm51elQ0dVFnTFl6cjRFVXBGTkNTN0MrMUREYVdkCk9DUTdDR0RNS3oxMmEyMm5lN1NNWmFNNWQ5V0tjRWFYWHZWdzBaUytqS1lsenRkMzJOYUlWRC9mdzNoa3JXY1EKSzBVZlV0SjBIY29HUmlybHRYdmNxdzNoTHl3T2NFd0ZtSzRKRmNEakNLa05zcTVxdWJjS1JRWVZhK0ZXeFRVbQpYeisreWFWNmllMGg5WGdRRlpLVjBCeGlCY2N5R25LZm45YTdlMXhRTGNJR2wvZFFUNXdDWlBUM1BJMGlTNytQCjFhVjB6UGZUTWYvODkzeGhPY1MrU0NmT2dOVlhpeW5qTEpRUG1odThKRVN0dlZtL213PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T15:14:19Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 5c5545b3-2648-4b28-a76b-66496b4639fd service.beta.openshift.io/expiry: "2028-04-15T15:14:19Z" creationTimestamp: "2026-04-16T15:14:19Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"5c5545b3-2648-4b28-a76b-66496b4639fd"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T15:14:19Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 5c5545b3-2648-4b28-a76b-66496b4639fd resourceVersion: "7708" uid: 0e84b81c-dbde-4a9c-8b0f-325e636ab734 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-16T15:08:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-16T15:08:15Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1950" uid: e506b000-d390-4cc1-80cd-e7d6bc063365 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-16T15:08:12Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-16T15:08:12Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1640" uid: eaa31f11-b974-4a43-a37f-bc01f246aaa0 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-16T15:08:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4037ac2a-fbb3-42b8-9148-81ab81042b6a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T15:08:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:44:45Z" name: node-ca-dockercfg-dn9rz namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 4037ac2a-fbb3-42b8-9148-81ab81042b6a resourceVersion: "42477" uid: 778649b3-931e-4577-8350-6d1ffb8a421c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-16T15:08:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"29920107-eeec-4487-b6ff-69a5ccf6adc0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T15:08:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:44:45Z" name: pruner-dockercfg-spbw2 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 29920107-eeec-4487-b6ff-69a5ccf6adc0 resourceVersion: "42471" uid: c841b12a-a897-4e96-b31c-09618aae08d1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-16T15:08:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cbb3072d-a49b-4ea8-83eb-e75023fb9837"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T15:08:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:44:45Z" name: registry-dockercfg-kfj7d namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: cbb3072d-a49b-4ea8-83eb-e75023fb9837 resourceVersion: "42490" uid: c306e059-6e59-43b0-9b68-9fd170bf222c type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "46662"