--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-21T17:30:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f5570b4a-0a7a-4867-a7a1-69b20130bebd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T17:30:21Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T18:06:21Z" name: builder-dockercfg-k5g5f namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: f5570b4a-0a7a-4867-a7a1-69b20130bebd resourceVersion: "43540" uid: 52d25b0e-253b-4df9-9a51-b5ff5d30092c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-21T17:30:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f82a5fa9-dabc-49a9-a48a-08c2ecf17344"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T17:30:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T18:06:16Z" name: cluster-image-registry-operator-dockercfg-vqht4 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: f82a5fa9-dabc-49a9-a48a-08c2ecf17344 resourceVersion: "43325" uid: d32bfa09-dd86-4920-addc-1ba2a45cecd7 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-21T17:30:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c1ceaeac-b029-4e9e-881c-7f3ab8a3f364"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T17:30:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T18:06:16Z" name: default-dockercfg-knvqs namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: c1ceaeac-b029-4e9e-881c-7f3ab8a3f364 resourceVersion: "43329" uid: 9d06289d-5fef-4644-bd58-7802873c213e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-21T17:30:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"39f16b2c-7754-4286-9a2d-a2a2876fe608"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T17:30:21Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T18:06:21Z" name: deployer-dockercfg-bvr8j namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 39f16b2c-7754-4286-9a2d-a2a2876fe608 resourceVersion: "43546" uid: 49ebdee2-e24d-4aa7-b0dd-4083d6c0c017 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a48f8a2a32edf4e76995e27e704df9c92cf8e08f212513c2222503e4f7f4cd3b creationTimestamp: "2026-04-21T17:29:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-21T17:29:52Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1810" uid: 7efd2b78-b575-4435-a040-48dd7d2bb46e type: Opaque - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVFVENDQXZtZ0F3SUJBZ0lJSlVEK2pXc3EreWd3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qYzVNamsxTlRBZQpGdzB5TmpBME1qRXhOek0yTURCYUZ3MHlPREEwTWpBeE56TTJNREZhTURZeE5EQXlCZ05WQkFNVEsybHRZV2RsCkxYSmxaMmx6ZEhKNUxtOXdaVzV6YUdsbWRDMXBiV0ZuWlMxeVpXZHBjM1J5ZVM1emRtTXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRRFYyeVkyR1BTT2xFQk5TSDc5SUJxcTk0NHNYVlROVHRTTwpOTGw1UURRU1FsVU5NR1BCOGFkRVVNY25kclh4YWN1NndUdnpENTczT2cxSDhxbHZFd1ZQNGZ1T1IwWFlPeUV6Ck41cTFVUkFGanRYL2lYa0JSTlV2UnBJejBsbitMcTFxczkrZEVvQUFhR2RwZmJYL0Z6alA4VTVkczZaaE5TSXgKN0Z1d0hxdUg3MitoSUEyc3lLZFJVZEthSExmVFVQQjZleUZ1OTVwQk83anBtRS9RaVhUTUZpQW50dWZrOW9DdApnVU94VTN1OW9yWXpIUWpPYW8wWkZNb3U1Ry9Nc0dRM0dDYzgrb1I2RXlWZWhUWlZCVDk3OTBqK2N3b2pXWUZTCmk5Z0ZXVHd5WTlyZ05lWjcwUUlaNFA4Wm5FQlVObUd5aVg2aitYUExzL3lwVHNPS2pQRjdBZ01CQUFHamdnRWgKTUlJQkhUQU9CZ05WSFE4QkFmOEVCQU1DQmFBd0V3WURWUjBsQkF3d0NnWUlLd1lCQlFVSEF3RXdEQVlEVlIwVApBUUgvQkFJd0FEQWRCZ05WSFE0RUZnUVUzTTRNTXV1MVV4MHRMMStXaHhpejZhdDFEOHN3SHdZRFZSMGpCQmd3CkZvQVUzd214SmY4TkJVTWNTelExM2NKaGNkR21zMU13Y1FZRFZSMFJCR293YUlJcmFXMWhaMlV0Y21WbmFYTjAKY25rdWIzQmxibk5vYVdaMExXbHRZV2RsTFhKbFoybHpkSEo1TG5OMlk0STVhVzFoWjJVdGNtVm5hWE4wY25rdQpiM0JsYm5Ob2FXWjBMV2x0WVdkbExYSmxaMmx6ZEhKNUxuTjJZeTVqYkhWemRHVnlMbXh2WTJGc01EVUdDeXNHCkFRUUJrZ2dSWkFJQkJDWVRKR1JrWldFd01tWXhMV1V5WkRZdE5HSmhPUzA0TURnd0xXRmpNbVZpTmpSalpXTXcKWWpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQUwyeUpYM3Y3eTNWRC92WXA2Qm9qckhxdThuQ2dwT3B6U0dZawpicDJ3MzFEQk5NT2h6WXJsMVJyajRqWUtma21vN05CTzEyV2tValdSaFdvc1hOcTFNL2tZM0UrNjg1a2oyS1BSCjVFZ2lpekF3L0w5STI1RGIrazZtemhBTEJOajRNNlZTV2NiWDZJaWFJNUQ1MEZHMi82cDBpRmtYQXh1b21iNmUKc2t3V0NHaEdQR3E4VTFzczQ4SGRpUFV2SWdhM0NubTJEbWFWc0NOM3dzaFJBNzFaakVGMWZiMld5VW9LZlI0VApqc28rVDRZd0RQa3Zpeng5NXEzSEFFZFltTnZaMVVRajNJcFlKdEI0QWhFUGoxQTE0SmZJR2hROHoyaFRia2dXCkFDclVxMUIwYUp4L2h4bHJxTHljb0pQMU9WenRWMTVadUNJeUpCM25NbWhrcDR1OTJ3PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlGVis1bkl6RlpVQXdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpjNU1qazFOVEFlCkZ3MHlOakEwTWpFeE56TTFOVFJhRncweU9EQTJNVGt4TnpNMU5UVmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTNPVEk1TlRVd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFDc1ZuRzN0dVhDSHZnSWRPTW1CdldUOHVnWGVQWXdMTHk4CkI3c1RONlVoRldVL1BvRUlpOVAxYzNScm1GTHNvc3lNWHVwQTF5MFBPRjF5WDFJbXBJUFExYlE3TlJWS0hKUmoKTk5hSGIvdzZpeWN6ZFV1MHh4UFBaQUJvUS9KbmM0M1dzRCtTdnhEVmVsTUU1Q3Z2a3NSZ1F5TEpvVGdLWFl0Nwp2UVNITERXcTRDTTBJTWZSVVhLQ1BwSDkvN003bkVCckgyL2hZSEZENFlNQnF6RjJJZi9qSllyR1RDNndxTkczCmF6VTkvNHQ4SVg2aVh2QldpZG1hMnRPMnlTMk1JblZHTEJaR3dDaEtiU0xubVhmRkQwTUhManVoSHRYdEozL3MKNDdodlZEajlLSVlncHQ4bU5jVXB5RklCb3BlRk5FbFlMYjc2WjZUU1p1Y0dva1ZPbGVoekFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCVGZDYkVsCi93MEZReHhMTkRYZHdtRngwYWF6VXpBZkJnTlZIU01FR0RBV2dCVGZDYkVsL3cwRlF4eExORFhkd21GeDBhYXoKVXpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVRKM2o5dFRPbUwrV1RzWmFOdjFOWjJjUURKKzV0SjFEVmRWWQpGNUFCNExnS253MVBMM0Qwd1dKMG43c0c1VDY1c1lmNzNuYjcyOWloTVhXcjZjb1RTWFhXeDIyNERTVDJvVzNVClUyaXhIblpZRnBjYTRuRnJ4ck5UcGJpclBhcXRJRW4vZDF5NDVKQkVlUTR6UTJsSkhnK3J2V3JBQTNSNDRMNVcKSE1Iak11WkRaMXlBMkpPT1RjNGxDUzNCS2w3ZWdaVForNkVQYllnS1IrUkVQVkpWRTlXUkpQT3YzT3RrZjRQUQpzMUY1U1BzSDY0Zzlkb2d6RisyR09KMUloRmZDQ2ZBalRCWEhyOUtTMWYvbmZodWtKR2ZVeTFHbVJRYmJ2VjVICkZmcVdnZG1LUFBMUk5SVllVM2dWZjNFUGlIQTh1NHhabGdlM3dEL1lnTms4cjdMVitnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T17:36:01Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: ddea02f1-e2d6-4ba9-8080-ac2eb64cec0b service.beta.openshift.io/expiry: "2028-04-20T17:36:01Z" creationTimestamp: "2026-04-21T17:36:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"ddea02f1-e2d6-4ba9-8080-ac2eb64cec0b"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T17:36:02Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: ddea02f1-e2d6-4ba9-8080-ac2eb64cec0b resourceVersion: "7704" uid: ec2477b8-4c80-458c-bbba-6bd7e2ccc8d9 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-21T17:29:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-21T17:29:52Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1809" uid: 1654e3d6-7afc-4659-ae45-8c71ae50d678 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-21T17:29:50Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-21T17:29:50Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1654" uid: 002b6bab-ade5-4e3c-b605-84ed0c0abe08 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-21T17:30:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"310c6d23-27c0-4df9-9e52-b9cba67fb367"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T17:30:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T18:06:16Z" name: node-ca-dockercfg-jgxnc namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 310c6d23-27c0-4df9-9e52-b9cba67fb367 resourceVersion: "43320" uid: 3f5d743e-528b-4913-a635-fef30d99d926 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-21T17:30:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7953db80-77d6-4881-8f7d-dfc30bbf7524"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T17:30:16Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T18:06:16Z" name: pruner-dockercfg-rv6fc namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 7953db80-77d6-4881-8f7d-dfc30bbf7524 resourceVersion: "43322" uid: c6b0bb87-9399-41e2-ac7c-6d625f89efc2 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-21T17:30:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0dae8853-7951-4a02-8685-878af9e408fb"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T17:30:16Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T18:06:16Z" name: registry-dockercfg-n6n9k namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 0dae8853-7951-4a02-8685-878af9e408fb resourceVersion: "43331" uid: 1991788d-e213-44b5-a81d-c391cccffd81 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "47355"