--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T19:51:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T19:51:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bd4f6e28-cc0e-40dc-9d14-2a2a5d50c1ac"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:51:20Z" name: builder-dockercfg-fwrbh namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: bd4f6e28-cc0e-40dc-9d14-2a2a5d50c1ac resourceVersion: "3731" uid: cde9ac03-a27e-4936-9617-28a17e4da125 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T19:51:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T19:51:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e071200f-f722-4191-84d6-c2a99850d675"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:51:15Z" name: default-dockercfg-lvmk6 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: e071200f-f722-4191-84d6-c2a99850d675 resourceVersion: "3159" uid: 58679fcf-4d94-4833-aa53-7d3d7fd7a6e5 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T19:51:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f632d583-96cc-4080-87f2-07ed08e28fe0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:51:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T19:51:21Z" name: deployer-dockercfg-xf96d namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: f632d583-96cc-4080-87f2-07ed08e28fe0 resourceVersion: "3779" uid: f4453752-77a2-49cc-85e6-395c33f969df type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T19:54:46Z" service.beta.openshift.io/expiry: "2028-04-15T19:54:46Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: ccc5d351-b2d3-4d30-8fc1-f71d1c909e2a creationTimestamp: "2026-04-16T19:54:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"ccc5d351-b2d3-4d30-8fc1-f71d1c909e2a"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T19:54:47Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: ccc5d351-b2d3-4d30-8fc1-f71d1c909e2a resourceVersion: "7080" uid: d32f8c30-5855-4863-9c80-4da5d06b2a91 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-16T19:51:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T19:51:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9b93bc67-25fb-40bb-a9ba-ce063ddf516b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:51:15Z" name: dns-dockercfg-668h7 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 9b93bc67-25fb-40bb-a9ba-ce063ddf516b resourceVersion: "3170" uid: cb96e00e-4e29-4f25-8625-6a9a8aa79a77 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-16T19:51:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T19:51:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3332be59-672c-4d8f-a5bd-bea5fd8d6335"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:51:15Z" name: node-resolver-dockercfg-x284t namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 3332be59-672c-4d8f-a5bd-bea5fd8d6335 resourceVersion: "3156" uid: 5ee0b211-8c20-460b-ba2d-70c3c6538f16 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "20793"