--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T04:20:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T04:20:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"dea124ea-cc87-44ff-ad5d-81235b599495"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T04:20:29Z" name: builder-dockercfg-dkc95 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: dea124ea-cc87-44ff-ad5d-81235b599495 resourceVersion: "4057" uid: c805a356-7120-4ef0-b12a-bc83c7b6a30b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T04:20:24Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T04:20:24Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7486316b-839c-4866-a507-af419ca07483"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T04:20:24Z" name: default-dockercfg-5k4zw namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 7486316b-839c-4866-a507-af419ca07483 resourceVersion: "3491" uid: 4b2e8edc-ca2b-4c33-a2d9-96d565d95dc8 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T04:20:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T04:20:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5bd394e8-eb45-4204-a434-a5377ea4d23b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T04:20:29Z" name: deployer-dockercfg-sgmcc namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 5bd394e8-eb45-4204-a434-a5377ea4d23b resourceVersion: "4064" uid: 1cbbab77-78f0-4e70-87d8-8c41b2f65287 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T04:25:46Z" service.beta.openshift.io/expiry: "2028-04-15T04:25:46Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 8c5780c4-84bc-4826-b47b-820e99b9f774 creationTimestamp: "2026-04-16T04:25:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"8c5780c4-84bc-4826-b47b-820e99b9f774"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T04:25:47Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 8c5780c4-84bc-4826-b47b-820e99b9f774 resourceVersion: "7577" uid: 5b9a1320-8cf8-4eb5-a926-e4d60d045abe type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-16T04:20:24Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T04:20:24Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"58167a81-5d9f-4214-abef-be3f31bbe567"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T04:20:24Z" name: dns-dockercfg-smz8d namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 58167a81-5d9f-4214-abef-be3f31bbe567 resourceVersion: "3492" uid: 7b5bc281-d536-46d0-a33f-435739757618 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-16T04:20:24Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T04:20:24Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"deb0ccbe-9dc4-4a7e-ab36-255863b119f3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T04:20:24Z" name: node-resolver-dockercfg-rg4l9 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: deb0ccbe-9dc4-4a7e-ab36-255863b119f3 resourceVersion: "3499" uid: 962c916b-9555-42ce-91fd-aeca3f6abef8 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "43715"