--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T21:10:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T21:10:25Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7f640380-d7c8-456a-9e5b-6669a9031f66"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T21:10:25Z" name: builder-dockercfg-j8s98 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 7f640380-d7c8-456a-9e5b-6669a9031f66 resourceVersion: "4074" uid: 0ddd68ce-a8ac-4842-81ab-b2d53ebb3cb2 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T21:10:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T21:10:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"dc096cf9-2776-4c38-a5a6-b3897418d75c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T21:10:20Z" name: default-dockercfg-bgptq namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: dc096cf9-2776-4c38-a5a6-b3897418d75c resourceVersion: "3507" uid: f4da3e67-d37b-4325-98af-d8838782aa50 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T21:10:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T21:10:25Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ffa93d3b-afc6-47d4-b7da-6247e20979ba"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T21:10:25Z" name: deployer-dockercfg-ph4t8 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: ffa93d3b-afc6-47d4-b7da-6247e20979ba resourceVersion: "4076" uid: 08dbf40e-7716-48ec-bb1d-4257c69f2247 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T21:15:50Z" service.beta.openshift.io/expiry: "2028-04-16T21:15:50Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 87483d32-8f15-42c3-8a9d-93e7bb92cf78 creationTimestamp: "2026-04-17T21:15:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"87483d32-8f15-42c3-8a9d-93e7bb92cf78"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T21:15:51Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 87483d32-8f15-42c3-8a9d-93e7bb92cf78 resourceVersion: "7685" uid: 631ebff9-07f7-44ca-ae04-5ca45bb2155b type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-17T21:10:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T21:10:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"766e519c-32f4-4699-ba73-577d5a199c35"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T21:10:20Z" name: dns-dockercfg-k464c namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 766e519c-32f4-4699-ba73-577d5a199c35 resourceVersion: "3509" uid: fc38ccdc-a05b-4e77-a419-d71ee259a013 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-17T21:10:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T21:10:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8ad0293a-cdab-4913-a1c5-e1f67e662eaa"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T21:10:20Z" name: node-resolver-dockercfg-t8jv7 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 8ad0293a-cdab-4913-a1c5-e1f67e662eaa resourceVersion: "3511" uid: b4f5ae98-1e71-4c1d-9723-bcc4e0974115 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "27692"