--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T17:21:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:21:33Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c953fb79-2bd6-4d24-883e-85bdfab6682a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:21:33Z" name: builder-dockercfg-xvrnw namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: c953fb79-2bd6-4d24-883e-85bdfab6682a resourceVersion: "3599" uid: 044cbd0f-f4b8-4ec5-881e-f29121b82d2b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T17:21:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0ece7053-895b-4d0f-b42e-1fd065eaee79"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:21:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:21:28Z" name: default-dockercfg-xvt56 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 0ece7053-895b-4d0f-b42e-1fd065eaee79 resourceVersion: "2989" uid: 667ae5ab-f4b2-4c64-aec3-5a280e4f1766 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T17:21:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"603488e9-0b52-40ca-ad8a-ce0272ed1030"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:21:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:21:33Z" name: deployer-dockercfg-qv2sg namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 603488e9-0b52-40ca-ad8a-ce0272ed1030 resourceVersion: "3590" uid: 5892f1b6-c2e1-4251-8aeb-3ac8c81d7747 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T17:27:21Z" service.beta.openshift.io/expiry: "2028-04-16T17:27:21Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: ed747478-174f-47a5-9274-31dfdfda27a1 creationTimestamp: "2026-04-17T17:27:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"ed747478-174f-47a5-9274-31dfdfda27a1"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T17:27:22Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: ed747478-174f-47a5-9274-31dfdfda27a1 resourceVersion: "7773" uid: cc527a15-896e-4a24-98a7-0134c497f1f9 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-17T17:21:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0b9ddbc6-911e-414a-9b59-187ef83d4705"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:21:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:21:28Z" name: dns-dockercfg-w4qb9 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 0b9ddbc6-911e-414a-9b59-187ef83d4705 resourceVersion: "2990" uid: de99a4b6-67c8-4d37-8c80-749bbb46058e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-17T17:21:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"688c8b8a-2bb4-4743-9b29-d27b455c6d17"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:21:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:21:28Z" name: node-resolver-dockercfg-nkq72 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 688c8b8a-2bb4-4743-9b29-d27b455c6d17 resourceVersion: "2991" uid: 9f851525-bee1-4532-b897-1bab817972c3 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21628"