--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T09:16:54Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T09:16:54Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d0eeecdd-0bd2-4fa4-80d6-524d79ce9b57"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T09:16:54Z" name: builder-dockercfg-2v72c namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: d0eeecdd-0bd2-4fa4-80d6-524d79ce9b57 resourceVersion: "4223" uid: 0cc3e77c-3492-47c3-b4aa-a750111ea550 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE4OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-17T09:16:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5fcff6b7-67c6-4dc9-be55-7e946e3ca3f5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T09:16:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T09:16:49Z" name: cluster-image-registry-operator-dockercfg-k9b6z namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 5fcff6b7-67c6-4dc9-be55-7e946e3ca3f5 resourceVersion: "3620" uid: 2fc07906-2676-4fc6-8c56-2c0d2780200c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T09:16:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c9cca8e1-a0c8-41d2-8af5-e2d3e1097bc0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T09:16:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T09:16:49Z" name: default-dockercfg-gnbsh namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: c9cca8e1-a0c8-41d2-8af5-e2d3e1097bc0 resourceVersion: "3624" uid: 7f09a459-4adf-4790-8c67-63c4b80beef9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T09:16:54Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T09:16:54Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3ffaa047-2524-48f1-8a4b-af4860aef4b9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T09:16:54Z" name: deployer-dockercfg-sjgx6 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 3ffaa047-2524-48f1-8a4b-af4860aef4b9 resourceVersion: "4222" uid: 2c58b760-98f7-45ef-ba04-319c83a90dbc type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:eb4b1e052f50d7161d8a17aa37b1f126435d14ad439e7d7701348525847be310 creationTimestamp: "2026-04-17T09:16:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T09:16:21Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "2967" uid: 4f28b13e-6d4a-4d6d-ac81-c42c13a5749b type: Opaque - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVFVENDQXZtZ0F3SUJBZ0lJQWwwTE5HaWYzaUl3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qUXhOemM0TVRBZQpGdzB5TmpBME1UY3dPVEl6TURaYUZ3MHlPREEwTVRZd09USXpNRGRhTURZeE5EQXlCZ05WQkFNVEsybHRZV2RsCkxYSmxaMmx6ZEhKNUxtOXdaVzV6YUdsbWRDMXBiV0ZuWlMxeVpXZHBjM1J5ZVM1emRtTXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRQzN1Ym1LNXJHK1VVbVlRMlBmR2ZqNFN4b1V0T1RHMk02Mgo5d3BTZlpTS1ozd1RTcFJoVC9jeklDTGpqUmdBcGNybFZkNzhzQjVxTmZpOXhWQXFlMHhvVGEyL1VmV2lKWWF1CkMrazZ0aVE5MWE1Uk14RTFoUFk3cHAzUlFMNEM4QWpuWlVqMm4zNmZtaGY1N1BoZTZCRW5PY2YwUiswd1oxUngKck8rdVdlTGdYSnlIVGRnSnBLQ0ozVlMrdVhxZUJsMXgzazdPSUhMemxOOXJPYVFlRmdrcExEdHdDbk9OZVpDcgpDeEtmUm5abjZYTE9xK2hPa20xMTllVW1VUmhGV2g5T1lzTUFkd3dwVUFYUmMyUS9wRW5MeVI2T2k0YnVyTWJhClh3a1F0aWdVQWJYdTNZUzB0eXpFWEpjZFYzM2ZYL05lL2ZHL21mbGlTOXNPa0F2Q2NOZjFBZ01CQUFHamdnRWgKTUlJQkhUQU9CZ05WSFE4QkFmOEVCQU1DQmFBd0V3WURWUjBsQkF3d0NnWUlLd1lCQlFVSEF3RXdEQVlEVlIwVApBUUgvQkFJd0FEQWRCZ05WSFE0RUZnUVVENGVMZFVXOTJzcFM4UFhwSlhvZFh6UC8wYzR3SHdZRFZSMGpCQmd3CkZvQVU1c2F0R0tVMGVSeitTQ0czRUhiTXVxV2xZeDh3Y1FZRFZSMFJCR293YUlJcmFXMWhaMlV0Y21WbmFYTjAKY25rdWIzQmxibk5vYVdaMExXbHRZV2RsTFhKbFoybHpkSEo1TG5OMlk0STVhVzFoWjJVdGNtVm5hWE4wY25rdQpiM0JsYm5Ob2FXWjBMV2x0WVdkbExYSmxaMmx6ZEhKNUxuTjJZeTVqYkhWemRHVnlMbXh2WTJGc01EVUdDeXNHCkFRUUJrZ2dSWkFJQkJDWVRKR1ZrTVRZMlltVTFMV1UxWlRjdE5ERXpPUzA0TnpBekxXSmlPV1EyTWpWall6WXgKTURBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWJvS1JzNEFuZ3cyRlVkeVpoWUtqSE1WMFpLendLdEJIcFoyTgpQUk9OUXNpYURwV0F6TlQ4VU5zRTg4R3l2K09WaDBUeHBQWi9PamhDTFR5amp4YWlTY3NEV3E2Nkl2cHNPdUdtClZzdDMrVmFnQUlqUy9DR2Y2Syt0YWFQOExiTTlSaTFhMXBhS0dsbVZ2QklJZ1VpMTVrdnJ4SjZaSU9WMmlCTHAKMHlVTFJyOUhFaTduWTc5SjNXVm9LWVd4NlFZUFB3ZzArTEVHbWNPRk5pWWF6WE5WTU5wTlJzeC9rRllnNXlKOQpnTWN3YWxRMWd4bFZKcUFNb3hnMlY1Qm5jOFZMSEVjMTAyR3Fud0RrKzNYNURIbXBsWVBCVnFmWlEyOHBvaHk3CkxIV0VqczdLeWRXZWZoM2wra1hIbHdjQkFZUEgybnhkVTVpRkNQaENQQlVJb0ZjR2tRPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlZSkRLUDNOWnZDRXdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpReE56YzRNVEFlCkZ3MHlOakEwTVRjd09USXpNREJhRncweU9EQTJNVFV3T1RJek1ERmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTBNVGMzT0RFd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFEMG9tQ3YzL1lxQXpXd0hKYmdTMlczeDlTVG1sem5EaWJKCjVFeFJlRCtjMDE0eVJpejlDQW9WSVRzKy9oZWRoNDliaW9pbFRLMVFUa1AzQlNmMW13U0JXL1BaWU9vUy9DalMKODlqemxsTUtKRzk5VEJiOGRxZm1iL1dLRkkvTVVLSTRNeThuRlF0V0F0M3QvS0ZLQjZqdVR4VEdaalJQcUlnSgo3Y3JsSVVPWWN4bzg2ME5jR0R2YjhuOENBZ1kxWERzU3EydjM3bUtCVXlHcmUrYnRkeVMramtIbG8yM0ZhQnRwCnhqaE1RRmlicUJHZFg2ZjdRK2F2WmNnYVdDWGxuYmVBL0grbGlLVW9WQTB4dytRQ2xjWXB3dTZyOHgybmMvQ0IKMU5JUGNiUnlkSjk4Y01pMDN6SDNXcCszcTRBTEJHWHpNdTByaFQ5aENYMWpMeG50VFJuWEFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCVG14cTBZCnBUUjVIUDVJSWJjUWRzeTZwYVZqSHpBZkJnTlZIU01FR0RBV2dCVG14cTBZcFRSNUhQNUlJYmNRZHN5NnBhVmoKSHpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQXdYTW0yQkRodlBqdnhnTlc2dy9QeGpsR1liMnlwVFRtRDh5RQpxM25hbmJsSEZ6Z2FHNWxmRUw4N1gvL3lneDRpZDVTU1VMemJDbE4zK2cvVVFnRHJzUENPRUQ4bnhQWjNMZGlqCkFoT3ZZZm9xdFBlME12YzBYcWltcXE4M3BTQ0RNS09ySzRSNHRTd0w2WVpES3pWTnhpRHNWQTdURzVBZnhzeGYKbzZEUkN6aDdFMGZxUnp0bUlPSnhxYUFEakpBUy9Oakp0a1lETjFiZVZuQ0djUlB6WFZnSk9qUGxuVXVDdmtSVgpEWktDV3Vidk5jd2FNdnBnOEJUK0tOOEt0WE82T0JMcHpXVnZ0bEUrbHY4cEgvRU5hMkpVV3VEbW9qcG9GRXNsCndRVkZ4SDVRa0cvcHlSaTY4ZEVnZ3dzR244ckpCTEh5bUdSOGloYU1VczlqYlF1WHhnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T09:23:07Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: ed166be5-e5e7-4139-8703-bb9d625cc610 service.beta.openshift.io/expiry: "2028-04-16T09:23:07Z" creationTimestamp: "2026-04-17T09:23:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"ed166be5-e5e7-4139-8703-bb9d625cc610"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T09:23:08Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: ed166be5-e5e7-4139-8703-bb9d625cc610 resourceVersion: "8118" uid: 638d7060-354e-4ac1-a10c-513fd5b9bb0b type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-17T09:16:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-17T09:16:21Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "2966" uid: 3eb82f85-b742-482c-a375-e7c6cd265ebd type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-17T09:15:51Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-17T09:15:51Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1647" uid: 18ef431c-99f1-4ee2-845f-49d085dad911 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-17T09:16:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"efbc39cd-724a-40e8-9a6c-236a59ce5251"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T09:16:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T09:16:49Z" name: node-ca-dockercfg-ldmbl namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: efbc39cd-724a-40e8-9a6c-236a59ce5251 resourceVersion: "3625" uid: 5463a338-e799-41dd-9146-c22496b4f367 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-17T09:16:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c1e10341-53fb-44bd-96ad-2adbaeda462c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T09:16:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T09:16:49Z" name: pruner-dockercfg-bq7fl namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: c1e10341-53fb-44bd-96ad-2adbaeda462c resourceVersion: "3627" uid: a6a706aa-d4a2-4706-b5c4-fc70ed02550d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-17T09:16:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4c3da7d1-c744-409c-a334-7069bcb0dd83"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T09:16:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T09:16:49Z" name: registry-dockercfg-brmrj namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 4c3da7d1-c744-409c-a334-7069bcb0dd83 resourceVersion: "3628" uid: eab9d1f9-19f9-4648-9e1e-88255b8d48b7 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "14132"