--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T14:26:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:26:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b96a41cd-10f8-42ad-a84b-e5eb530f3b72"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:26:37Z" name: builder-dockercfg-2mnts namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: b96a41cd-10f8-42ad-a84b-e5eb530f3b72 resourceVersion: "4187" uid: 8df9a3e9-73b0-4131-aa45-4a9c48794ea5 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T14:26:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:26:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a08154ba-c820-43c5-afd4-63fc73042c62"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:26:31Z" name: default-dockercfg-qsqmv namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: a08154ba-c820-43c5-afd4-63fc73042c62 resourceVersion: "3600" uid: bba8231f-e6bf-4911-997c-b8e9c2b4215e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T14:26:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"980f79d0-6c5e-4f76-9f3f-39b96fd5e8ba"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:26:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:26:37Z" name: deployer-dockercfg-4p25r namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 980f79d0-6c5e-4f76-9f3f-39b96fd5e8ba resourceVersion: "4183" uid: 7a4343ec-1194-484d-a061-73fd2b09a4d9 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T14:31:59Z" service.beta.openshift.io/expiry: "2028-04-15T14:31:59Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: eee3abb7-def3-4998-a691-7792050c9fa9 creationTimestamp: "2026-04-16T14:32:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"eee3abb7-def3-4998-a691-7792050c9fa9"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T14:32:00Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: eee3abb7-def3-4998-a691-7792050c9fa9 resourceVersion: "7685" uid: 6262aac0-2941-4d78-b1b8-f39e538371e2 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-16T14:26:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:26:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"96fb4612-6cab-41a3-b196-cb8321e547c2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:26:31Z" name: dns-dockercfg-dqsrn namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 96fb4612-6cab-41a3-b196-cb8321e547c2 resourceVersion: "3604" uid: 31db2014-016c-4b35-affd-687519c01b1f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-16T14:26:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:26:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e562fa0d-f068-44bd-9248-d01220d48b38"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:26:31Z" name: node-resolver-dockercfg-d74dj namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: e562fa0d-f068-44bd-9248-d01220d48b38 resourceVersion: "3610" uid: e5ee2579-a73e-4504-8809-a17fc34e5c51 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "29448"