--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T20:55:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:55:00Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1ee69561-80d2-4db0-b2d7-5bf9b8d52962"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T20:55:00Z" name: builder-dockercfg-94czk namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 1ee69561-80d2-4db0-b2d7-5bf9b8d52962 resourceVersion: "3974" uid: b5cb6b3b-7a2b-4982-a94b-01da7c2921ad type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T20:54:54Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3473dcbb-d81e-4b25-89bd-5f0131d08b55"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T20:54:54Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:54:55Z" name: default-dockercfg-dwm6s namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 3473dcbb-d81e-4b25-89bd-5f0131d08b55 resourceVersion: "3254" uid: 69dcdba6-e270-417c-ba47-cd43d287074e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T20:55:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:55:00Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9c59a9ca-7db5-4531-b233-ef05b474a463"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T20:55:00Z" name: deployer-dockercfg-k6nzc namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 9c59a9ca-7db5-4531-b233-ef05b474a463 resourceVersion: "3972" uid: 76cef9c1-136d-43a5-a4be-7650f56a8049 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T21:00:36Z" service.beta.openshift.io/expiry: "2028-04-15T21:00:36Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: c88b5869-f589-4fe2-a414-06ded7015d7a creationTimestamp: "2026-04-16T21:00:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"c88b5869-f589-4fe2-a414-06ded7015d7a"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T21:00:36Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: c88b5869-f589-4fe2-a414-06ded7015d7a resourceVersion: "7716" uid: b59ca1e4-2184-4f8f-86ff-eb9d9e48b792 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-16T20:54:54Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"dd67af06-6206-43d0-96b4-1f1fe94d773e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T20:54:54Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:54:55Z" name: dns-dockercfg-kfmp4 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: dd67af06-6206-43d0-96b4-1f1fe94d773e resourceVersion: "3255" uid: 2f004e83-be31-46bb-bae4-68c04ec81f98 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-16T20:54:54Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f16021e3-0126-4594-81ab-b7e23ff01860"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T20:54:54Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:54:55Z" name: node-resolver-dockercfg-48sqq namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: f16021e3-0126-4594-81ab-b7e23ff01860 resourceVersion: "3260" uid: f62ebd0d-3f7e-4bb2-9c8e-728632ce57d6 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "41966"