--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T09:58:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5956d361-6464-421d-84bb-6a0ddaa72096"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T09:58:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T10:34:28Z" name: builder-dockercfg-45mps namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 5956d361-6464-421d-84bb-6a0ddaa72096 resourceVersion: "22178" uid: d6b1d75f-cc36-46ed-a8f7-2a43dedac8f9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE5MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-20T09:58:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"762a68a6-0c3c-431f-8927-5c692fb51791"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T09:58:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T10:34:23Z" name: cluster-image-registry-operator-dockercfg-sgxhv namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 762a68a6-0c3c-431f-8927-5c692fb51791 resourceVersion: "22025" uid: 635df3e8-808d-428c-912c-b27a192d62fa type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T09:58:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"058eedf5-a1fe-4208-913b-c69a0ede4d48"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T09:58:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T10:34:23Z" name: default-dockercfg-9zzfn namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 058eedf5-a1fe-4208-913b-c69a0ede4d48 resourceVersion: "22010" uid: 7c926cbb-468d-4bf1-a5b1-a74efff8b2ba type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T09:58:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"643f40b1-2b3b-4bbb-a49a-2b333e1e60e9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T09:58:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T10:34:28Z" name: deployer-dockercfg-ssl8r namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 643f40b1-2b3b-4bbb-a49a-2b333e1e60e9 resourceVersion: "22177" uid: 111fb622-432d-4aa7-a562-4534cdaddd79 type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:91ecddeb4f72c245bf3bebfbc782ce3e90f181decb0d9f61b3f2bdf49a410ba9 creationTimestamp: "2026-04-20T09:58:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-20T09:58:04Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1886" uid: 555801e0-c407-46df-b609-491816b222d4 type: Opaque - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVFVENDQXZtZ0F3SUJBZ0lJVW1zWGk3cFJNL3d3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qWTNPVE14T1RBZQpGdzB5TmpBME1qQXhNREF5TURaYUZ3MHlPREEwTVRreE1EQXlNRGRhTURZeE5EQXlCZ05WQkFNVEsybHRZV2RsCkxYSmxaMmx6ZEhKNUxtOXdaVzV6YUdsbWRDMXBiV0ZuWlMxeVpXZHBjM1J5ZVM1emRtTXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRRFlEeXRaQXZQT3pCaEJqT1BXTGtKWnFrSjRzZCtOUDAzSQpGMVQrN3VOV01yTkFxbU1PNUNmYVVycGdXSjI2cVViWGtOUklqY0xlSWhwV1JrK1hUWCtHRXhkVGxkRUxlb3R5CmVjRE9LYWRqWGdXUEVPZzJkcUJJclYxY1ZINnAxZkw1bXRaekVxZXJEMXZQckd3ci9objl3QzJNZi9YbXBnSW8KdUF3a2RYM0tmMC9tM0cwdG9MRWFFTTdmbDRWcFlXSXJjWWFpOElGVzkweWxIb3pDclNHcmlxOGV6N3ZHNVovWQpSWGFXYnpxVGdHRklBZ2drMERzMHNpOElKZnRuTkJuUE1ma3NzSDg2dXBJeVFBWjVtdkpudnhTMStudVlwd3cyCjdxK3cvb3hTdi80QUk1c1FBamdtVVZJWmFZUXJUWGJpUWVTTWg4cVNyRDQzM29ZbmgwRFJBZ01CQUFHamdnRWgKTUlJQkhUQU9CZ05WSFE4QkFmOEVCQU1DQmFBd0V3WURWUjBsQkF3d0NnWUlLd1lCQlFVSEF3RXdEQVlEVlIwVApBUUgvQkFJd0FEQWRCZ05WSFE0RUZnUVVOL0lGQ3dPTGcwRzZZeGlOb2JDTi8vcDN6QjB3SHdZRFZSMGpCQmd3CkZvQVVzd05temJkV1UrTHpkNUtudThjSmwvSkc0cDR3Y1FZRFZSMFJCR293YUlJcmFXMWhaMlV0Y21WbmFYTjAKY25rdWIzQmxibk5vYVdaMExXbHRZV2RsTFhKbFoybHpkSEo1TG5OMlk0STVhVzFoWjJVdGNtVm5hWE4wY25rdQpiM0JsYm5Ob2FXWjBMV2x0WVdkbExYSmxaMmx6ZEhKNUxuTjJZeTVqYkhWemRHVnlMbXh2WTJGc01EVUdDeXNHCkFRUUJrZ2dSWkFJQkJDWVRKRGMxWmpRMlltWTFMVFZtTldRdE5EZGlaQzFpTVRobUxUZzVZVE5qTmpVM05UWmsKTmpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQXRaSEJ2V1BIeUNTWUdZYUl2SHhDamlEK1BUQWthMmNtOC9wZwpRT0VCVDE4cHloaWJBYkpWb2pQZktYc2loUHY5TTNNMjVMKzJ4N2RuYWZZUk54U2dUNTZlcnZzQ0cyendIWmdvCkJQTTN0ZDRFNHArL1FkQU9UUDBSTVkvaERxMk51dlhmMzRTemFqQitCdGpKUkpxdERpa2dtY0MweXhRYkhMSWoKUmJ2d3UxT09sL09MeHNpaEU1aG5JRXNrYytVQ04zNjVNN2Y5eFZ0N3NraGJpcFJmcjhwSFl0R0Y0WTFEYnVOOQpYc3krdkdhbzBkUlRUODg2bm1hVWR6T3VvcWZadEIwcW1rQmJtU3cxVGEzYnF1dnVOY016NUdoSWRyd3B0di9GCm82UEFCeHRDbDQzS3hZTk5aN3hkcVZLODd1MlhGVzJGSElkbi82QzBQWDRCd0hWVy9BPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlWTVJ0bzdWQjBEd3dEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpZM09UTXhPVEFlCkZ3MHlOakEwTWpBeE1EQXhOVGxhRncweU9EQTJNVGd4TURBeU1EQmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTJOemt6TVRrd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFETmZoNVc0NlJrdC9ZVlEyUFN4WDdrVUtidG5nTUJUWTJ6CllaQXRmNHg1bFgzZlI3SCtiVzZSN2RVK0x6TTJXTGc4STZRZ0pCb01BUldPN2RhQUNDN1lTcU1HaUlwbGk0K2UKazhtTU00djJEaFU2NkVJUklaVkZxQTNNdm8xUjVzM0Ryb255c1FHZ0k0eEtZa2crY1hJRStvS2lZQWJ1bGNBUQpCUjE5dWpHQ04wZmQ2STNSS2RtMW1QZlVjbUszaXRmMDIvZ002UFFMQk1ZNEdKOGFnQ3l3ekVLTVZRQlFlbDN4CjVTbU9Zb0UreDRDeVF6cS95dGttVndhV1pJNUljMmhLandEOVBuVlRyTWExYW1OZWVadzdYdGI1WjZ2WEVDVEwKc3hBQWJjS28yVEJ3cFJZM0RYc014UzR0S05kOXQ3QTVRRTJPdzk5ZXpuU2pZNCs3aDVzbkFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCU3pBMmJOCnQxWlQ0dk4za3FlN3h3bVg4a2JpbmpBZkJnTlZIU01FR0RBV2dCU3pBMmJOdDFaVDR2TjNrcWU3eHdtWDhrYmkKbmpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQUdWUERtTEFxRFVXUlpuMXVCVjllbkVYZGhtdkU3MXpFWEg2NApBd3NtaWp1SUNOcHBMekp1Mk5HSnNHOW11Z216Y2lUVnlzaCtuc1hDd295U0VuRUFYN29KRXhJNkd3ZFF6bFJPCnN0ZHJsamxYTnJnVGFJdU1lek9uWmdwY3dQNmh2SjhuMCtlSWM5VWFvdW1hRzlpZ3JzMW54TFlkbUJtb0FNaU4KNmJZL2I4OS9jbWtIR2Y3WUZjTnM4OCtGcVpQSVVzaWd4bnoxTml0UWN5REx6eFRXUzJBR3JOcTR4aGVMRDBKLwozdEgxYlVxOFJqZFZkelNOK2xwajBHL1V4NkFNWHlRbkVZQmI4WHZENjNmNWcyUEI1QVNJelBaZFYyc21pejhJCmlFekgwMDBGQWsxZDZlMkdOc0svWFZ5UUw5UmdzVitTWmtVQ1hIRjF6Z3JHdEdjNE9nPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T10:02:07Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: 75f46bf5-5f5d-47bd-b18f-89a3c65756d6 service.beta.openshift.io/expiry: "2028-04-19T10:02:07Z" creationTimestamp: "2026-04-20T10:02:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"75f46bf5-5f5d-47bd-b18f-89a3c65756d6"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T10:02:07Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: 75f46bf5-5f5d-47bd-b18f-89a3c65756d6 resourceVersion: "7342" uid: f347753c-89d9-40d3-96a0-5721009b6a66 type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-20T09:58:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-20T09:58:04Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1883" uid: 2deb5ba0-d80f-4cd4-8a93-ebe6e10b3a71 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-20T09:58:02Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-20T09:58:02Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1683" uid: 14ffaabd-948e-4934-9ae2-6ab164c6fa74 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-20T09:58:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"83012f33-5e10-4f2a-afe4-c9d771b888c0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T09:58:23Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T10:34:23Z" name: node-ca-dockercfg-mbqcm namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: 83012f33-5e10-4f2a-afe4-c9d771b888c0 resourceVersion: "22031" uid: 317994d3-6807-4e32-a760-b1f3d462c04e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-20T09:58:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"13b90eab-d076-42e4-95e4-6f4ee682dbdd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T09:58:23Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T10:34:23Z" name: pruner-dockercfg-n59np namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 13b90eab-d076-42e4-95e4-6f4ee682dbdd resourceVersion: "22013" uid: b1c8ec9d-ac16-406f-8d5e-4644ff2e6d1c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-20T09:58:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"875678fd-3a3e-40c1-8748-f25848b7bb2c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T09:58:23Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T10:34:23Z" name: registry-dockercfg-w6bmx namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 875678fd-3a3e-40c1-8748-f25848b7bb2c resourceVersion: "22021" uid: ee7adcb3-59cf-48b7-b2b3-c9ed8b2ff89b type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "23641"