--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-21T04:35:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:35:25Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"81297459-0bf1-41bd-93d1-d3d6089cb41f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T04:35:25Z" name: builder-dockercfg-vn9nw namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 81297459-0bf1-41bd-93d1-d3d6089cb41f resourceVersion: "4111" uid: c7d01e8b-04c5-4f63-9329-c7b854990587 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-21T04:35:19Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:35:19Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"410781c3-d86d-4741-97dc-b9fd4ccbfd12"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T04:35:19Z" name: default-dockercfg-k8sm6 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 410781c3-d86d-4741-97dc-b9fd4ccbfd12 resourceVersion: "3529" uid: 9ba49399-5b81-4666-9579-a2794480b739 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-21T04:35:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:35:25Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"06e2a310-4a02-4139-bde3-276db06dc379"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T04:35:25Z" name: deployer-dockercfg-bcp7x namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 06e2a310-4a02-4139-bde3-276db06dc379 resourceVersion: "4108" uid: 59e90074-94f0-4108-8253-745993f6b406 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T04:40:55Z" service.beta.openshift.io/expiry: "2028-04-20T04:40:55Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: b224f97f-7b43-46bc-bffe-65f3ba4458e9 creationTimestamp: "2026-04-21T04:40:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"b224f97f-7b43-46bc-bffe-65f3ba4458e9"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T04:40:56Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: b224f97f-7b43-46bc-bffe-65f3ba4458e9 resourceVersion: "7731" uid: fd986aad-fa6b-4455-95b9-10ecffbd0c58 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-21T04:35:19Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a59d3600-ea7c-426a-a39b-19cfcd1cad41"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T04:35:19Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:35:20Z" name: dns-dockercfg-f9n52 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: a59d3600-ea7c-426a-a39b-19cfcd1cad41 resourceVersion: "3530" uid: 046f47a7-f433-4232-aa23-ff3dfdb55fc7 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-21T04:35:19Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0b87c182-d9cf-4b5f-9f58-da2f9993e797"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T04:35:19Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:35:20Z" name: node-resolver-dockercfg-vz5cd namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 0b87c182-d9cf-4b5f-9f58-da2f9993e797 resourceVersion: "3533" uid: d1dd5cd9-4ecd-495e-a265-bd1e611ae398 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "26611"