--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T11:12:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3500b458-f726-4b4c-86e0-cf98fb5d3efc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:12:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:12:23Z" name: builder-dockercfg-j7pc7 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 3500b458-f726-4b4c-86e0-cf98fb5d3efc resourceVersion: "3737" uid: 55d50c97-c009-41cc-9178-5ba2728bb651 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T11:12:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:12:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"44ef73c6-b993-4f07-afb1-6df3f09ddf38"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:12:18Z" name: default-dockercfg-gd9pj namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 44ef73c6-b993-4f07-afb1-6df3f09ddf38 resourceVersion: "3176" uid: 1322d0bd-643f-4ba1-83b2-319a6dac70b3 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T11:12:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"26e63ea3-ffb3-4b78-b504-cfdd73f62bd8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:12:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:12:23Z" name: deployer-dockercfg-2wt54 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 26e63ea3-ffb3-4b78-b504-cfdd73f62bd8 resourceVersion: "3743" uid: 18271003-57f2-49f0-829e-0bbe1806ca2e type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T11:16:28Z" service.beta.openshift.io/expiry: "2028-04-16T11:16:28Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: e9c1064d-780d-44f6-b065-832cb52b4602 creationTimestamp: "2026-04-17T11:16:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"e9c1064d-780d-44f6-b065-832cb52b4602"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T11:16:29Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: e9c1064d-780d-44f6-b065-832cb52b4602 resourceVersion: "6804" uid: 6e6c0b64-dde7-43d9-a188-e9e65e0e21ab type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-17T11:12:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:12:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"16d30a6f-3d9c-4ee3-a996-1dcf8c94597e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:12:18Z" name: dns-dockercfg-f8bg7 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 16d30a6f-3d9c-4ee3-a996-1dcf8c94597e resourceVersion: "3173" uid: bbc52350-5018-49f3-8aae-b887b20a1aa2 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-17T11:12:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:12:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d05a2e84-50c8-4763-ba87-dea4abcb036d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:12:18Z" name: node-resolver-dockercfg-96w8j namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: d05a2e84-50c8-4763-ba87-dea4abcb036d resourceVersion: "3188" uid: bcdeb976-54da-40e6-b601-517ea6d32b9c type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "13698"