--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T17:38:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T17:38:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"48fdf5fe-8667-4c4e-bf4e-cec2685c96c3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:38:14Z" name: builder-dockercfg-7p45j namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 48fdf5fe-8667-4c4e-bf4e-cec2685c96c3 resourceVersion: "3775" uid: 3841070d-b618-4857-8d05-30de8ad440cf type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T17:38:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T17:38:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"18f9ab57-a7af-4142-88f0-da6dd3e62e72"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:38:09Z" name: default-dockercfg-fdjns namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 18f9ab57-a7af-4142-88f0-da6dd3e62e72 resourceVersion: "3152" uid: 7f3325ad-4002-46df-8354-1aeb09c0b210 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T17:38:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T17:38:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0b0a3bcc-ccb2-4f45-ad9e-971cbe8b0e78"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:38:14Z" name: deployer-dockercfg-7x9lx namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 0b0a3bcc-ccb2-4f45-ad9e-971cbe8b0e78 resourceVersion: "3774" uid: 533aff58-4a6c-4b3c-8bdf-68da43e4d7b1 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T17:43:51Z" service.beta.openshift.io/expiry: "2028-04-15T17:43:51Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 103a4300-db3c-4d69-9774-de960a4203b5 creationTimestamp: "2026-04-16T17:43:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"103a4300-db3c-4d69-9774-de960a4203b5"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T17:43:52Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 103a4300-db3c-4d69-9774-de960a4203b5 resourceVersion: "7814" uid: e12a8598-3c79-460f-9fc9-c4f84ae1f905 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-16T17:38:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T17:38:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3c3bbb9e-8425-4c50-8656-61c20ca190fd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:38:09Z" name: dns-dockercfg-2vlxb namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 3c3bbb9e-8425-4c50-8656-61c20ca190fd resourceVersion: "3182" uid: e78c020e-c816-427c-85fd-9c1c0cebe5b7 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-16T17:38:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T17:38:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0deb5c8f-d0cb-4d46-82e4-af09b1002ebd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:38:09Z" name: node-resolver-dockercfg-qmr25 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 0deb5c8f-d0cb-4d46-82e4-af09b1002ebd resourceVersion: "3189" uid: e27ead71-6bce-40e5-9afb-5e937ba40d9f type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "20456"