--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T07:48:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T07:48:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"903da321-8580-4107-a798-455c33278b0e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:48:01Z" name: builder-dockercfg-4wn7w namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 903da321-8580-4107-a798-455c33278b0e resourceVersion: "3824" uid: 9aa91a52-5fcd-48bd-930a-6f631649d975 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T07:47:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T07:47:56Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f8ddef30-4702-4902-ae8c-4e5b0d6a1544"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:47:56Z" name: default-dockercfg-pm4dj namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: f8ddef30-4702-4902-ae8c-4e5b0d6a1544 resourceVersion: "3208" uid: 50c94103-045e-436e-9004-9a93d0837e01 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T07:48:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"379948e9-db11-44a8-b235-afaf8c462b9b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:48:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T07:48:02Z" name: deployer-dockercfg-vfxjs namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 379948e9-db11-44a8-b235-afaf8c462b9b resourceVersion: "3828" uid: 84733d95-87e0-4f97-bb02-5e02527e7749 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T07:54:13Z" service.beta.openshift.io/expiry: "2028-04-16T07:54:13Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: ff58decb-d23b-414a-8c01-2c2d8ed424dd creationTimestamp: "2026-04-17T07:54:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"ff58decb-d23b-414a-8c01-2c2d8ed424dd"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T07:54:14Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: ff58decb-d23b-414a-8c01-2c2d8ed424dd resourceVersion: "8000" uid: 9c9e6ed3-1b0b-4764-936e-5723da1c9a77 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-17T07:47:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T07:47:56Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"16ff6349-6f0c-4987-8fe3-873efa21ef4b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:47:56Z" name: dns-dockercfg-l9k4x namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 16ff6349-6f0c-4987-8fe3-873efa21ef4b resourceVersion: "3205" uid: 927003bc-63cb-4772-bb87-5947f53545c8 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-17T07:47:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T07:47:56Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4c5f4f37-42bf-47f9-b729-984c859fc713"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:47:56Z" name: node-resolver-dockercfg-qw9hw namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 4c5f4f37-42bf-47f9-b729-984c859fc713 resourceVersion: "3227" uid: e8d95920-58b3-48e4-912e-827fd060e2ee type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21979"