--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T18:12:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:12:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cdeb5d99-23ee-498a-a046-288cc8d3b670"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:12:20Z" name: builder-dockercfg-5mrqt namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: cdeb5d99-23ee-498a-a046-288cc8d3b670 resourceVersion: "3707" uid: f1e31ec5-d7d0-4b09-96a2-afa768ca00e6 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T18:12:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:12:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6656da62-f558-414e-9f76-1a33ee89c3db"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:12:15Z" name: default-dockercfg-7pq2x namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 6656da62-f558-414e-9f76-1a33ee89c3db resourceVersion: "2946" uid: 5dd6192a-8665-463d-bf65-f56d11e23bb1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T18:12:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:12:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"90ea0a8a-49c7-405d-aa9f-67ab4326700f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:12:20Z" name: deployer-dockercfg-v2mcm namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 90ea0a8a-49c7-405d-aa9f-67ab4326700f resourceVersion: "3701" uid: fa5b9126-be37-47b8-9c33-70e3fe247784 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T18:18:09Z" service.beta.openshift.io/expiry: "2028-04-15T18:18:09Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: f4836b10-5a84-495b-8f51-e815cb5c07e0 creationTimestamp: "2026-04-16T18:18:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"f4836b10-5a84-495b-8f51-e815cb5c07e0"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T18:18:10Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: f4836b10-5a84-495b-8f51-e815cb5c07e0 resourceVersion: "7787" uid: 99581c28-6456-4f8f-aa47-00cf2667b156 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-16T18:12:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:12:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2fbceebe-591d-4c40-b4fb-fc1c9a942f57"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:12:15Z" name: dns-dockercfg-fxg25 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 2fbceebe-591d-4c40-b4fb-fc1c9a942f57 resourceVersion: "2947" uid: da9319b3-f12e-4bb8-bc19-01c71e4d00bc type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-16T18:12:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:12:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"57d86272-eb0e-44ca-bd51-07caeb5f7841"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:12:15Z" name: node-resolver-dockercfg-8n2dn namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 57d86272-eb0e-44ca-bd51-07caeb5f7841 resourceVersion: "2952" uid: 8850f38d-82d6-4e29-9885-8df15ca95377 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "23783"