--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T13:53:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bb235397-7cbf-433c-a5f4-7ef41452a6ff"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:53:55Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:53:56Z" name: builder-dockercfg-n72nj namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: bb235397-7cbf-433c-a5f4-7ef41452a6ff resourceVersion: "3980" uid: 03ff2a6a-46fc-48f1-a4e8-2bdc2facb12b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T13:53:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:53:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4522b970-3337-4545-b52f-2a69df439cac"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:53:50Z" name: default-dockercfg-fhf2d namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 4522b970-3337-4545-b52f-2a69df439cac resourceVersion: "3368" uid: bbd747ac-656e-4aac-b158-6c833684be20 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T13:53:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3e76d4fe-1e98-4e4b-9023-613a112ea7a1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:53:55Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:53:56Z" name: deployer-dockercfg-lfqsk namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 3e76d4fe-1e98-4e4b-9023-613a112ea7a1 resourceVersion: "3991" uid: 7e9843c8-b316-4382-bb55-cf59d671f72e type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T13:59:54Z" service.beta.openshift.io/expiry: "2028-04-15T13:59:54Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: adf1f9a8-aed9-4d55-bd12-55228141afc2 creationTimestamp: "2026-04-16T13:59:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"adf1f9a8-aed9-4d55-bd12-55228141afc2"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T13:59:55Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: adf1f9a8-aed9-4d55-bd12-55228141afc2 resourceVersion: "7935" uid: 041b9878-169a-4372-95f4-210501a1ef38 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-16T13:53:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:53:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"15d1d112-4ecd-44e6-9bd1-584633c78d9c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:53:50Z" name: dns-dockercfg-ftzrr namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 15d1d112-4ecd-44e6-9bd1-584633c78d9c resourceVersion: "3387" uid: 647bfed3-8f32-42d8-839e-b10320a0ce97 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-16T13:53:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:53:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"10af8e7c-32b7-4f6c-bbf8-de8f4d23232a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:53:50Z" name: node-resolver-dockercfg-9c8gz namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 10af8e7c-32b7-4f6c-bbf8-de8f4d23232a resourceVersion: "3391" uid: 3fa69fc4-f4b6-4f49-a3e0-70792d528710 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21633"