--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T20:00:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0a0279a6-3105-4b82-accb-18b1aa0b8892"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:00:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:00:10Z" name: builder-dockercfg-lhc64 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 0a0279a6-3105-4b82-accb-18b1aa0b8892 resourceVersion: "3769" uid: f9c12f61-d8ff-4dba-8995-2c2809e36fa0 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T20:00:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:00:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5f52dc5d-605d-4b45-9e68-8baff87ae053"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:00:04Z" name: default-dockercfg-5hckt namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 5f52dc5d-605d-4b45-9e68-8baff87ae053 resourceVersion: "3079" uid: 043fa5ad-529e-4373-83ed-0dc00a23f08a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T20:00:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"51cb6936-380d-4a6d-b275-223f129115c7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:00:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:00:10Z" name: deployer-dockercfg-bvbtx namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 51cb6936-380d-4a6d-b275-223f129115c7 resourceVersion: "3786" uid: c24a9325-75e0-4aa0-91f0-659a9fcd4bb1 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T20:05:49Z" service.beta.openshift.io/expiry: "2028-04-16T20:05:49Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 37c91d28-a548-4abe-a0fa-b16e14e8e871 creationTimestamp: "2026-04-17T20:05:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"37c91d28-a548-4abe-a0fa-b16e14e8e871"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T20:05:50Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 37c91d28-a548-4abe-a0fa-b16e14e8e871 resourceVersion: "7729" uid: 130c0f84-5f52-4865-a421-c5b578d2988a type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-17T20:00:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:00:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7d693405-316f-4d06-a0e0-4707b5ae651e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:00:04Z" name: dns-dockercfg-4cbzc namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 7d693405-316f-4d06-a0e0-4707b5ae651e resourceVersion: "3085" uid: 5cbd8058-4659-4db2-815f-11e2f310ef09 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-17T20:00:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:00:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"889d354b-3e1e-4fc8-8863-3da5dd693eb3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:00:04Z" name: node-resolver-dockercfg-hbspv namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 889d354b-3e1e-4fc8-8863-3da5dd693eb3 resourceVersion: "3086" uid: 00f42be6-d360-475f-b360-524609511ad5 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "27410"