--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T19:22:26Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T19:22:26Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"64abeba0-a7eb-473d-ba97-9b0a450a6e76"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T19:22:26Z" name: builder-dockercfg-w6tx2 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 64abeba0-a7eb-473d-ba97-9b0a450a6e76 resourceVersion: "4061" uid: a42da14f-d42a-41fc-bf2a-3fafe305d707 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-20T19:22:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cf36520e-1cbf-49be-bb5c-eb43def6b863"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T19:22:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T19:22:21Z" name: cluster-image-registry-operator-dockercfg-znrqz namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: cf36520e-1cbf-49be-bb5c-eb43def6b863 resourceVersion: "3379" uid: 4d7f4b7f-9f44-4de9-9f2d-3e429842c60c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T19:22:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"995a9347-83f4-4257-a6d4-633f95169f56"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T19:22:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T19:22:21Z" name: default-dockercfg-scpbk namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 995a9347-83f4-4257-a6d4-633f95169f56 resourceVersion: "3393" uid: ba640621-4602-4a8e-8af3-f2d9ae40de65 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T19:22:26Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T19:22:26Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"accc2184-3220-4183-a716-bf813b30086e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T19:22:26Z" name: deployer-dockercfg-tjcbw namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: accc2184-3220-4183-a716-bf813b30086e resourceVersion: "4057" uid: e642f533-1374-475e-9c89-f0d19b48fdcc type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:211e43a60f06dc5f087913994a1a02b55944bcc5ae61f5eed021c36cb064a3a7 creationTimestamp: "2026-04-20T19:22:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-20T19:22:10Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "2662" uid: 7972edac-833a-48b4-bc82-d0426d5cd64c type: Opaque - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVFVENDQXZtZ0F3SUJBZ0lJV2lwUUNkaDYrOTh3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qY3hNekkzTURBZQpGdzB5TmpBME1qQXhPVEkzTlRWYUZ3MHlPREEwTVRreE9USTNOVFphTURZeE5EQXlCZ05WQkFNVEsybHRZV2RsCkxYSmxaMmx6ZEhKNUxtOXdaVzV6YUdsbWRDMXBiV0ZuWlMxeVpXZHBjM1J5ZVM1emRtTXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRRFNtOSt5d1JsVXRoVUpZcVY2bW55Si9LWU5CaWNnTGpkeQoyMWFORWdVbkQ1NWxHSFFTZEtaTk9OVVdrblJCdzd0TGxQM016azNkb3E3by9hckp6elhadGg3cGxFY1ZBL2x1CkhlcWhLOXFVNDI5cnlNZVFjZEhJUDNoOHJqTGo3REhJVmwxaFNCTi90Vk16Z0xKMm9aY3E0SDZWWUZobXNNUngKRkM5dUlXMGkwUXBSZ0N3MXYvZWpaVysxTEpEMTV5Rm5sbjI0WlgyeTl6Y2p1OExKWE9USEd0YmFmSkFBUU5XRAptK29Vb29XRDN0KzJtVC9veWZMVDI2N2dUemNMWm1yTHVzZ2JvNTd6amJVNjVDVXJ2V05mN3EvWHFnekVYSzdMCm1iczdPRWc5MzVMNUc3OStmYVMzalVodng3R2RGZ3NwUi9XbWJnQmx6akRyMmtXMjkwRy9BZ01CQUFHamdnRWgKTUlJQkhUQU9CZ05WSFE4QkFmOEVCQU1DQmFBd0V3WURWUjBsQkF3d0NnWUlLd1lCQlFVSEF3RXdEQVlEVlIwVApBUUgvQkFJd0FEQWRCZ05WSFE0RUZnUVVBdzJ0MEFHSy9wc3o5WXhGS1ZEay94U1BMZk13SHdZRFZSMGpCQmd3CkZvQVVoME8raDdyNFBMR0grVGhxc1ZSQTZ6OGM2UkF3Y1FZRFZSMFJCR293YUlJcmFXMWhaMlV0Y21WbmFYTjAKY25rdWIzQmxibk5vYVdaMExXbHRZV2RsTFhKbFoybHpkSEo1TG5OMlk0STVhVzFoWjJVdGNtVm5hWE4wY25rdQpiM0JsYm5Ob2FXWjBMV2x0WVdkbExYSmxaMmx6ZEhKNUxuTjJZeTVqYkhWemRHVnlMbXh2WTJGc01EVUdDeXNHCkFRUUJrZ2dSWkFJQkJDWVRKRFV6WXpCalpHVmxMV1U0TVRndE5HRXdOeTFoT0RNNUxUa3pOMkpqWTJOa1lqWmkKT0RBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWlpUkZ0RVBZbzdyRng1M3VUdm15SE5QL0hJM1JrUmQwRWxWQQpqRzJUenVmTHlsdEE2VFhHMHJ4TzdYOVIzZ21WQmJRcWNyUFByclJydHRjbVpudDBVUGpGdDN0UjcyUTdZTEM0ClpGZmIvYlNBMjM2V2MxYkR5cWtwZVNqU3NWM21sQzAzWXBkTW5XNUN6ejZ1U0RSVlpwdnExaVZ6RC9xanBIS3kKdXNTbGxZcDZKWXdUTG9EcEhDdS85RCtPUGQ5VW9qVFhUS2pOTkl5RktUTFl4cUhKdFRWUWVJZERNMlFQSHdTUgp1bEdFbkVlUFhZUmc0RU1uOG1PTERzVER3d0dkZnIzNkFNemFwOEVwK0NiV0hTYnBrTDFRQkRzT2gxVVlTMjhhCmdUWTMrMkt4U2J0c0UyZE9Pamx6WS8vRFE2cnZaYXo5aU5UOXVXUlR2QXhxdkhZREVRPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlWQzZ4WThpUjBUMHdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpjeE16STNNREFlCkZ3MHlOakEwTWpBeE9USTNORGxhRncweU9EQTJNVGd4T1RJM05UQmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTNNVE15TnpBd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFDdmFibS8xZ0xIbUhKdk1uK1BERjlLUkRBWjJBZmVabXJJCmFpN2ZMMG8wajVFaFNOaTFNelRwSjhabkkwOU5rc3VZRTFEenNrbldPcjhwNThXS3JkUmx6RkdLU3VYQmFlUFQKV0hIYy80bVdMWFY3NE1ZS1RrbWx0OWU5TmRrOXV2d3k1NExmeml5cjhob3grRGdEZ0NDby9KYVJkZ1M4S0JieQpzOFJEMkFPMnJhdDc5SjdUYXQwU0I5clNGNFBMdEZpdlM1c3lXeFJid203YmdNQUNiUStKSXBRVjV1RjNMYmdpCkhaQi93L0VyRDdDM2xEWmpua0hBMjdaSnUzMjMrRWtBWmllNlphWU45QnArbXp2THpuMU5iVDREditnZk42cnIKa0sxR1llMnFrUi9jdUIxK2NjZlhpam9aM3lTN29yOEUreHRibTB6cnR6Z01pbzhiMXFlSEFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCU0hRNzZICnV2ZzhzWWY1T0dxeFZFRHJQeHpwRURBZkJnTlZIU01FR0RBV2dCU0hRNzZIdXZnOHNZZjVPR3F4VkVEclB4enAKRURBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQW5sMkI2eE9YbFVoVDVVWk5FWmhJWUtKZzd1bUNJWW9WRlR3bQpUZDdDaEdUclBsbzNBSllEN09idzZwZzlUUEVXNGRuR3dhRGJaSkd1bHRiMndqWmNKWFMzZ0FZWWY1Z1N5alJOCmc2U3FiUTlDNHppRjdiVHQ4NUExQU1Jdi8xNTR3WFJuckJrU1JINHBqRW93bnpVRG93MEVWbDNOeHRIVWtDdEQKZ1ljbG9OZGtrSjJrclprZ0RWTExERFZqMjhOdThvclRyQ09UcDhKUzZjbDRhZkx1c1lzVmZSbW92aU9CYkhPQgplalQvVW90SlVBaHd6MDI2QzVBcnVqUnoxRnpZakRVM2dsN1VuZzBCVFg4U1VsTW81dVZQN1o2ZXZKZFlQUWluClNwM04zQ0grRHpERTZPRVM3UlJpVXFOLzFZZXlWRlVxVGVwYi83MnRLVmx5c2FIUWhRPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T19:27:56Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 53c0cdee-e818-4a07-a839-937bcccdb6b8 service.beta.openshift.io/expiry: "2028-04-19T19:27:56Z" creationTimestamp: "2026-04-20T19:27:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"53c0cdee-e818-4a07-a839-937bcccdb6b8"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T19:27:57Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 53c0cdee-e818-4a07-a839-937bcccdb6b8 resourceVersion: "7703" uid: dcfd59af-a118-43b8-bd83-0e18bb376d32 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-20T19:22:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-20T19:22:10Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "2661" uid: dca392fd-a93e-494d-8c04-bd8f2a600420 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-20T19:21:38Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-20T19:21:38Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1623" uid: 8c8141dd-d68a-48f6-b3af-f6cb07c65295 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-20T19:22:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"06aee83f-8bb5-4450-a41e-5ac4e6c1e740"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T19:22:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T19:22:21Z" name: node-ca-dockercfg-btbzq namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 06aee83f-8bb5-4450-a41e-5ac4e6c1e740 resourceVersion: "3397" uid: 66928aaf-533d-4c51-9bf9-8722de963efb type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-20T19:22:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4fab1e1a-8c86-4aac-af85-147accc5dbc0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T19:22:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T19:22:21Z" name: pruner-dockercfg-b5v7d namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 4fab1e1a-8c86-4aac-af85-147accc5dbc0 resourceVersion: "3401" uid: dbded988-a80f-4acf-8357-3d96d732b919 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-20T19:22:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fbbd3120-a337-4708-a156-2ca4034eb406"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T19:22:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T19:22:21Z" name: registry-dockercfg-8vchn namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: fbbd3120-a337-4708-a156-2ca4034eb406 resourceVersion: "3403" uid: 6aee8aae-fe5e-4326-995c-96af2b2acac6 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "26963"