--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-21T06:22:11Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T06:22:11Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"40498a16-7df7-4309-87ea-1f46b9b47c3d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T06:22:11Z" name: builder-dockercfg-lpf6p namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 40498a16-7df7-4309-87ea-1f46b9b47c3d resourceVersion: "3653" uid: ffb0eba2-3e7f-44ae-a19a-9195242cecb7 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTE4OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-image-registry-operator creationTimestamp: "2026-04-21T06:22:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"34991290-7aef-44e4-a7ca-c618508db0d8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T06:22:05Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T06:22:06Z" name: cluster-image-registry-operator-dockercfg-96lg5 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-image-registry-operator uid: 34991290-7aef-44e4-a7ca-c618508db0d8 resourceVersion: "2976" uid: b55d58a5-ce30-4e25-be7b-6ead11a190fb type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-21T06:22:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f6752cbe-0c60-4c47-8471-5bac2dba961d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T06:22:05Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T06:22:06Z" name: default-dockercfg-hkxch namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: f6752cbe-0c60-4c47-8471-5bac2dba961d resourceVersion: "2977" uid: a7a21b60-e1aa-4109-9aff-e1e1cdc38cec type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-21T06:22:11Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T06:22:11Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"92461018-de8d-4f65-9264-07bcef1dfea9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T06:22:11Z" name: deployer-dockercfg-tg76v namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 92461018-de8d-4f65-9264-07bcef1dfea9 resourceVersion: "3654" uid: 15230226-ac64-43e5-af1e-a82f3c9a87be type: kubernetes.io/dockercfg - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:027c669a20a32515264349d67627af0855bebf95ef6764e9c166585c81d6141d creationTimestamp: "2026-04-21T06:21:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-21T06:21:44Z" name: image-registry-private-configuration namespace: openshift-image-registry resourceVersion: "1940" uid: 7cffd0a1-f899-466a-9638-9c4c5fee155d type: Opaque - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVFVENDQXZtZ0F3SUJBZ0lJTy9WZ08rZXlhMTh3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qYzFNamcyT0RBZQpGdzB5TmpBME1qRXdOakkzTlRSYUZ3MHlPREEwTWpBd05qSTNOVFZhTURZeE5EQXlCZ05WQkFNVEsybHRZV2RsCkxYSmxaMmx6ZEhKNUxtOXdaVzV6YUdsbWRDMXBiV0ZuWlMxeVpXZHBjM1J5ZVM1emRtTXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRREd0RE45Z1pnVmN3UWhHTStpaStnVU0ySGVqZ1dxeWJrVAo3RkxwVU9pNUt2d1Z5VVBzVXNsaUo1ZkdsMHRTS05pWVMxQTk3Rm9UOTJmZkdBdkRSWFVMMU02dDNlYmhncFpZCktzZ253VVdaRzA2U2Ywd1BjSFd6NE1Xank5RVJZMkdBVnZ6ZThKN2RzNTdPKzZZaUVNN1h4a2hYOUtuWTFSeUgKVTJ3U3dqQUJhdG5DUmM2d0RsZVEwNnhLeXZTQ0hpckloYndTSWJzck9sdCtPQzJMaGtIT2JVMG9oUzRtT3RRNgo0US9WZ0hKQm9GSkJuRUNiN1k1cjNaQnVaQ2l6OWJvS0hVTmpiQ2IvM3dzNGNaOE9iNjlJcXB1THlieDVScVptCmV3MEZBbjFLZWV5UVg5RjZxU1FwN2FLZ3NxeHVRbEdKeDhkUVh1R1N5OHhjUkU2MHg2aFRBZ01CQUFHamdnRWgKTUlJQkhUQU9CZ05WSFE4QkFmOEVCQU1DQmFBd0V3WURWUjBsQkF3d0NnWUlLd1lCQlFVSEF3RXdEQVlEVlIwVApBUUgvQkFJd0FEQWRCZ05WSFE0RUZnUVVTR09HaXlZa09TR0ZIeFBySW5TOVcxTFRVcm93SHdZRFZSMGpCQmd3CkZvQVV0cUlIUFJZRE5kVW1lN0JYMnNTVjBuWEJ2Wmt3Y1FZRFZSMFJCR293YUlJcmFXMWhaMlV0Y21WbmFYTjAKY25rdWIzQmxibk5vYVdaMExXbHRZV2RsTFhKbFoybHpkSEo1TG5OMlk0STVhVzFoWjJVdGNtVm5hWE4wY25rdQpiM0JsYm5Ob2FXWjBMV2x0WVdkbExYSmxaMmx6ZEhKNUxuTjJZeTVqYkhWemRHVnlMbXh2WTJGc01EVUdDeXNHCkFRUUJrZ2dSWkFJQkJDWVRKR0ZqTTJOaVlXWTFMVGhtWWpZdE5HWTNOUzFpTTJFM0xUUXhObVk0WkdZeE5tRXcKWkRBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQUlERVJVZ2VnZmo1dEhqd3hiS3lNM0hYUmVidy9RMkRqdFREaQpyMElEYzErby9oZnQwWDZqa3FxelhlYU9FYkVHbXF3Vk5UMlNROWh0ek9KOFNEbkNYcHZhMTFzSnFuUnJSUzhmClJNakNDVHN4cFdjYTRQZ1FRTWJ1TlpVMDcrV3VVMi9QWW0rb09Cc2hDV3B4cXhOWXpQN0RRSFN2T1BVSnBXQksKaDcrNk1Fd0RERGI0dlZLVVUzWFhIRGMrMzdBd1NJbkcxS2Y5TVVoQ29hbGFXNUxhNUFMdlpFNWswWUh2SU1HVgpCenF5V2h0L1o3SzFWQks2UllnNmpTK085Y3FUd3NRalVoTzVGVDBrVVZyc09Ea1FEazhkc0cycUlLRnQ2aDdOCjgzQ1A4SHBVUzJaN093TlpERCtLakt2MEhUYVNiVE8zWTgyaEYrSFlhSzJIMjJZV0pBPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlJMlJwdFJuRHdnOHdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpjMU1qZzJPREFlCkZ3MHlOakEwTWpFd05qSTNORGRhRncweU9EQTJNVGt3TmpJM05EaGFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTNOVEk0Tmpnd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFEUHd1MXRieGFGZG9IVHczdUxNNkpFTzRhdm5ZREJ6cWdMCnVPQXhRbytyKzVTWVlFMFVJM29DR2JXK1F6bFFSaVR5VVczVWlDYjN3MitnUUpSbFVKMGdWRXozc016NzdkY0UKeHA2SjBWZGVVV2lrR1BlbXl2TTFSSFRoUElOOHhuOTBhdFVGYThNaXFXN2hOdU8rWkd6Y1YwOXI3cEtObVpYdQpYWm1vT0JEcVF2VWVlYkJ6aVdOdHdwUVBRSkhIQzNTckNNejdDMzN1dmFCT0VCcHVUd1VtTlp1WkZ2dGRwenFvCkJjaXBqZDd4Rjk2ZGpSLzMzRWJod290WXIzRTRwWC85dVdYMnZjUmNUeE5IRE9HZVRIdEMydnk0TlVZbnJGaXoKV3JuSndSREhja2ZoS3dqaGxhLzlMMnZXMTlWd2tBUWpBMFJJc2VaNmFhUDFGTEVmV0djUkFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUzJvZ2M5CkZnTTExU1o3c0ZmYXhKWFNkY0c5bVRBZkJnTlZIU01FR0RBV2dCUzJvZ2M5RmdNMTFTWjdzRmZheEpYU2RjRzkKbVRBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVNIUVYyNElnUW11S1ZPRDErSjR1TFVXdjI3SEZvUC92RnR3WgpsdWhDOUNHU3d6cVJ5Z0U4TzdxZG9lRy9BNndmZWthWjVrcmwxQkkwNEZtNlhLb09XVHhQcmZjUzNwVncxSk1QCk83MTFrOGZNQ3hJWXFwV213Qjh0WmNrZmN4cmlpWXVhYjRKcVIwcXZTNXhBYjBLVmVhYnhoSjQ4M01wM0Y2bm8KOE1LMTZGVWhQeUtMRWN1bVNmZXVXaS8ra3FmaVoweWI5Z2k3TzB1cTA0WVZvN01NS2gvWWh5RFo2SEtLNTFEdQoxWHM3ZFdEMHdzQll3dlJFSzBOSUVlc1laSzVlN3NmQmpNSXZwYWg2UG05L24vUFgwR3JaWHNkeTk4YnJNRmd0CkplUDVVemx6WEVKSjVxUGRpSzV2TWp0OEVBRDFrVCtxMnB1cmw4L3MxNkZEbldZUVh3PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/image-registry with hostname image-registry.openshift-image-registry.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: image-registry-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T06:27:55Z" service.alpha.openshift.io/originating-service-name: image-registry service.alpha.openshift.io/originating-service-uid: ac3cbaf5-8fb6-4f75-b3a7-416f8df16a0d service.beta.openshift.io/expiry: "2028-04-20T06:27:55Z" creationTimestamp: "2026-04-21T06:27:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"ac3cbaf5-8fb6-4f75-b3a7-416f8df16a0d"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T06:27:56Z" name: image-registry-tls namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: Service name: image-registry uid: ac3cbaf5-8fb6-4f75-b3a7-416f8df16a0d resourceVersion: "7710" uid: 0bad6223-2bfa-4d33-b379-999b4425d2ad type: kubernetes.io/tls - apiVersion: v1 data: .dockerconfigjson: Mjc5MCBieXRlcyBsb25n kind: Secret metadata: annotations: imageregistry.operator.openshift.io/checksum: sha256:a1eac4c0e07888f52818e08d5f236afd26decdc158411b2f054c1e9d08d9364a creationTimestamp: "2026-04-21T06:21:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:.dockerconfigjson: {} f:metadata: f:annotations: .: {} f:imageregistry.operator.openshift.io/checksum: {} f:type: {} manager: cluster-image-registry-operator operation: Update time: "2026-04-21T06:21:44Z" name: installation-pull-secrets namespace: openshift-image-registry resourceVersion: "1939" uid: 33003a87-2cf6-4405-9981-e5ad88689158 type: kubernetes.io/dockerconfigjson - apiVersion: v1 data: credentials: MjE3IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-04-21T06:21:41Z" labels: hypershift.openshift.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:credentials: {} f:metadata: f:labels: .: {} f:hypershift.openshift.io/managed: {} f:type: {} manager: hosted-cluster-config-operator-manager operation: Update time: "2026-04-21T06:21:41Z" name: installer-cloud-credentials namespace: openshift-image-registry resourceVersion: "1623" uid: 09720650-80df-4362-aa87-ab682b48a501 type: Opaque - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-ca creationTimestamp: "2026-04-21T06:22:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T06:22:06Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b934ed9d-fb17-4319-91f1-ec5bd0934a4e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T06:22:06Z" name: node-ca-dockercfg-284kh namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-ca uid: b934ed9d-fb17-4319-91f1-ec5bd0934a4e resourceVersion: "2982" uid: 89b90801-06ba-4758-bac0-39b366300b1e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: pruner creationTimestamp: "2026-04-21T06:22:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T06:22:06Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"16872831-28fe-4b08-a510-394b10216581"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T06:22:06Z" name: pruner-dockercfg-ptn45 namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: pruner uid: 16872831-28fe-4b08-a510-394b10216581 resourceVersion: "2998" uid: 56add221-50bb-48f8-aca4-cc934c04d364 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: registry creationTimestamp: "2026-04-21T06:22:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T06:22:06Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9dc9af73-d375-4c74-918d-45c16a6c00da"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T06:22:06Z" name: registry-dockercfg-9wmrl namespace: openshift-image-registry ownerReferences: - apiVersion: v1 kind: ServiceAccount name: registry uid: 9dc9af73-d375-4c74-918d-45c16a6c00da resourceVersion: "3001" uid: 8eaa222b-6700-4f6c-b65e-519b4733a065 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "16566"