--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-21T15:31:54Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e996c0ed-f6bd-4454-ba26-6001a44cf510"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T15:31:54Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T15:31:55Z" name: builder-dockercfg-l8wpc namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: e996c0ed-f6bd-4454-ba26-6001a44cf510 resourceVersion: "4143" uid: cebe243d-b20a-4961-ac35-ee29e400fc5f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-21T15:31:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T15:31:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c0e24fc6-cf6c-43f7-9abf-e4725c34004e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T15:31:49Z" name: default-dockercfg-r4jbg namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: c0e24fc6-cf6c-43f7-9abf-e4725c34004e resourceVersion: "3243" uid: f45c5f4b-08bc-49b1-a9e2-18ad27d4b54f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-21T15:31:54Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2827e4df-0dff-49da-a49f-d1b714dbf310"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T15:31:54Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T15:31:55Z" name: deployer-dockercfg-tsp5p namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 2827e4df-0dff-49da-a49f-d1b714dbf310 resourceVersion: "4136" uid: 38934e38-898c-43ba-a94a-005bd4dd0f5d type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T15:37:31Z" service.beta.openshift.io/expiry: "2028-04-20T15:37:31Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: b20c1a7b-89bc-4740-8df7-7d567afe59bf creationTimestamp: "2026-04-21T15:37:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"b20c1a7b-89bc-4740-8df7-7d567afe59bf"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T15:37:32Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: b20c1a7b-89bc-4740-8df7-7d567afe59bf resourceVersion: "7765" uid: df40b83a-abfc-4a54-96d7-5ee47910f815 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-21T15:31:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T15:31:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"65a67840-3529-455c-8055-0ac1ffb12f0c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T15:31:49Z" name: dns-dockercfg-7ld2z namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 65a67840-3529-455c-8055-0ac1ffb12f0c resourceVersion: "3238" uid: 58b7c1e1-6b6d-47f3-9f3f-bc209fcc87e7 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-21T15:31:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T15:31:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e1a81a4a-6667-45f2-8b09-1bcc1282f379"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T15:31:49Z" name: node-resolver-dockercfg-4fz95 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: e1a81a4a-6667-45f2-8b09-1bcc1282f379 resourceVersion: "3244" uid: 28a42865-0200-49a4-8655-f67ebc89c699 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "37093"