--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T21:44:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"918dbc85-a56f-4764-a683-c5a47a70f06b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T21:44:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T22:20:40Z" name: builder-dockercfg-ldkm2 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 918dbc85-a56f-4764-a683-c5a47a70f06b resourceVersion: "43354" uid: fc75db72-e67c-4ce6-8f29-6520f63afd4e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-20T21:44:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"32dd1d67-d4d2-4165-8dba-5d32dfd0a718"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T21:44:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T22:20:36Z" name: cluster-image-registry-operator-dockercfg-fxbdh namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 32dd1d67-d4d2-4165-8dba-5d32dfd0a718 resourceVersion: "43113" uid: 6a027289-9849-44f6-9057-32db5401b648 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T21:44:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1dc2011f-bb78-4fce-b8b9-4c55b9f8479d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T21:44:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T22:20:36Z" name: default-dockercfg-clkmc namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 1dc2011f-bb78-4fce-b8b9-4c55b9f8479d resourceVersion: "43126" uid: 6e1c3ef2-5d2e-4196-bef4-13d481528cf7 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T21:44:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0c178ab1-41db-455d-9d16-dbf438466d20"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T21:44:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T22:20:40Z" name: deployer-dockercfg-rwn97 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 0c178ab1-41db-455d-9d16-dbf438466d20 resourceVersion: "43337" uid: 2dc182e8-b5d2-461f-9cac-60de3516644a type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:d63154958758c447d3329c5d390c475cf0736a47ae04edbe072fb5a450d4b9c5 creationTimestamp: "2026-04-20T21:44:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-20T21:44:32Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "3598" uid: d04a6c1b-22d9-448a-be24-2bf14d950acf type: Opaque - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVFVENDQXZtZ0F3SUJBZ0lJWmloWjlqZjkyRzR3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qY3lNVGMzT0RBZQpGdzB5TmpBME1qQXlNVFE1TkROYUZ3MHlPREEwTVRreU1UUTVORFJhTURZeE5EQXlCZ05WQkFNVEsybHRZV2RsCkxYSmxaMmx6ZEhKNUxtOXdaVzV6YUdsbWRDMXBiV0ZuWlMxeVpXZHBjM1J5ZVM1emRtTXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRQ3BWNGNOYisxc25wRy9CVWZ1aWJveWRDS252NnR4L0daYQpvZTZRM2JKWHAxV2hWYjA4WE01UWdXTnZjOWpGeHZxd2FwU0o3ckhkVHNSdlVPaXYwdWMyaHhCUmJlNG1hS1AxCndaVmhWQzR4Tnovc0RJaGpqRCtCQ2hhNzdpZXVkRnp0M0ovNUVOQjdCbkoveVFoVHJFMUFhSTQ1aVI3OERPaW4KYW4yWUM2clBreFZwU1BaR094NVNlU0dlQ2d4a0JXSm5ZU2hrYkk3cHN3M0cybFhBWVdmQWR4cERzK3NvMzFMSQo2UEt3QnZIWXRhZk5KMVlHWUNwNlBzVWhzRjdmS292VlkzMTBJM2FWeUMwN1Jic0RwZnNrTkRZQVNWZ3AyMDlhCmUzbStwaW52OEdMNTF4TmJFU0o2KzNIM2F2TDRxaG1ROWRFdFMybzJwc1p3TjI5RjJidk5BZ01CQUFHamdnRWgKTUlJQkhUQU9CZ05WSFE4QkFmOEVCQU1DQmFBd0V3WURWUjBsQkF3d0NnWUlLd1lCQlFVSEF3RXdEQVlEVlIwVApBUUgvQkFJd0FEQWRCZ05WSFE0RUZnUVVYNTBCc1FEZ0E2VExWYk9PaysrZGZGU1huMWN3SHdZRFZSMGpCQmd3CkZvQVVEamNxVzV3QmJRY3M0UzhDMlFsMjFmU2NlMTB3Y1FZRFZSMFJCR293YUlJcmFXMWhaMlV0Y21WbmFYTjAKY25rdWIzQmxibk5vYVdaMExXbHRZV2RsTFhKbFoybHpkSEo1TG5OMlk0STVhVzFoWjJVdGNtVm5hWE4wY25rdQpiM0JsYm5Ob2FXWjBMV2x0WVdkbExYSmxaMmx6ZEhKNUxuTjJZeTVqYkhWemRHVnlMbXh2WTJGc01EVUdDeXNHCkFRUUJrZ2dSWkFJQkJDWVRKREV3WldabVpURXpMV05pWVRNdE5HUmtZeTA1TlRNMExXUTBZVEUyTjJSbU56RXcKTWpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQXdoZkY2YWdYakxwdFBNL0c0K2pORkdjT0liNFdTcndrQzF3ZgpUNnl1YjVJVEFkcUpOdWhEcWQxdkM0M1Rmei9SVzE3Und6eGlXYWdUbFFaUTZXaVhBMitxcjJqbW9Od2RsMkNxCjNhaVJtQ1RwZXVJc2k1R1d0R1RUQm8yL1l4UkZaUkNNemFabmJ0K1pqK2huTkFOd2JWdXZVMi9tQlp5MmJndXIKS0JOUm9EaDFiOUI5akJhT3lxMlJDZ0xPL0RILzJ4VlNFT1JtRmtrTjR2aGJ4dHhZZDBzWDdQV1F3Q0ZkSEVoTgpVajFOTXFxWFJhcWNRcUxqRlRPRGZURFRHRm9kVEZLa2k2SzNCUk1IU2dWNXZLQzJGaTFpVXl0WGRlZzluUklrCjMzRWZ3R0FQVC9aT1NnUXFlMGJBMVdwWk8yVHVCbjNvOWx4R2swY1VFZG9MSTJTNEpRPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlGWjlyeWxKSjM0b3dEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpjeU1UYzNPREFlCkZ3MHlOakEwTWpBeU1UUTVNemRhRncweU9EQTJNVGd5TVRRNU16aGFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTNNakUzTnpnd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFEQ1R0M2dvSnhZcUI4VitzdndzeklTT2NhMEVuck5NMUtRCkRzTFQ3NTVEOUNsZzgxQjJFaVJDa3V3V0s1WmdIL21VS3Zoc0dkenhVb21WSkE3RVNQV1ZhUmhrcGlxYVRENzAKa0JhY2FEeU9hTFRWTlY4NHgxVkNqODQ1aUMvTS92VDQ3WFljS1JNdU1ibitjanRlYmNSeWw1MjZGQjR2WnF6MApERGFCaVh5RCt3Y213T0hhRytBY25uR005ZmlPdytHcWJQazNIcGZJZTIxbytRMFl4K0JzKzRHeE16YVpmcGd4CjBIcEZxSlVQTWpaTGR5dENreG5jUjVrQm85Zmt1TEE4aEVyM01QL29ZZmVFRldocFNDSTNIUFU3UVF2OXpWZzUKeTYvR1JneXJ5TFNQWUZ3eWpSaVN1cUVCbU9MRjNLOHZ1cTgwMlhBc2lkeDBMNHlIUzVxZkFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUU9OeXBiCm5BRnRCeXpoTHdMWkNYYlY5Sng3WFRBZkJnTlZIU01FR0RBV2dCUU9OeXBibkFGdEJ5emhMd0xaQ1hiVjlKeDcKWFRBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWNBMDVlVVMyenIrNnVuV0t1TXFyM080M1dIVnlDQkh4ZG1ORwpoSEp1OXlpRDVKRFpZdS9tdlk4TDcxSEV2NDFLeGFvUDhWa1IzMFhMclNHTEFvd0FWOTFnazIxNlFuaWpIU1JzCkRlZ2xqOW9IM21IODhOZURiZFNwbDRuMlp0dXZBeTkvMmJJZE5PRENtMGdWK3RHZlNNaFF6SExmNmZCTGExZW4Kb3pibnpNdWtnSytiRTVVdktBc2d2REF1dzZLTmpGNmoyeDNpa3Z3S0JxMmJQWWNIYzBwQ1FaMHM0bGtSK3haWgpQRmxYREk5VFpoekkzUUQzTktnMm1ZY0NNbisvWHpEVzlVenNZVm85THRJUTZjb0VORnd1VnRvTm1lQjVZVmI2CjR5bEFGQlZvZHpNdEFzUlBUeFFBcFArdUNvUGlVTjY3ZlhqM1lHMkpQWm5DV3MvZVJnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T21:49:44Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 10effe13-cba3-4ddc-9534-d4a167df7102 service.beta.openshift.io/expiry: "2028-04-19T21:49:44Z" creationTimestamp: "2026-04-20T21:49:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"10effe13-cba3-4ddc-9534-d4a167df7102"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T21:49:45Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 10effe13-cba3-4ddc-9534-d4a167df7102 resourceVersion: "7728" uid: d289e156-039f-44bc-b30b-fbe2bf1aea87 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-20T21:44:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-20T21:44:32Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "3577" uid: 71dcbcc0-ca43-410c-8f75-7ce0664b70f3 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-20T21:43:34Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-20T21:43:34Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1619" uid: a98581c2-9e72-4052-a8d3-811a52b35534 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-20T21:44:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"666a808f-50e4-4627-95a9-9df6a223b998"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T21:44:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T22:20:36Z" name: node-ca-dockercfg-4nmcg namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 666a808f-50e4-4627-95a9-9df6a223b998 resourceVersion: "43128" uid: 24f6a6dd-7ac0-45f0-a031-580e192e3f67 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-20T21:44:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8dba2a55-9396-45df-9baf-601f3ace6a67"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T21:44:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T22:20:38Z" name: pruner-dockercfg-rkvs6 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 8dba2a55-9396-45df-9baf-601f3ace6a67 resourceVersion: "43236" uid: 16de3c86-c5fc-4df5-984a-4f29c95484b9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-20T21:44:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"406e7307-b831-4100-8c9d-c6344c21fb80"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T21:44:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T22:20:39Z" name: registry-dockercfg-rxx7z namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 406e7307-b831-4100-8c9d-c6344c21fb80 resourceVersion: "43294" uid: e72d9e5e-417b-4899-9672-1213e64457a6 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "46392"