--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T20:11:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:11:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"799904c5-613c-4382-addd-62656483e914"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:11:49Z" name: builder-dockercfg-qqx5j namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 799904c5-613c-4382-addd-62656483e914 resourceVersion: "4095" uid: c7919978-0990-4017-98c9-74b42c8fbcf9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T20:11:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a8d6ed88-1cea-4ffc-aac7-eafac9c93e2c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:11:43Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:11:44Z" name: default-dockercfg-tmnws namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: a8d6ed88-1cea-4ffc-aac7-eafac9c93e2c resourceVersion: "3506" uid: 29b0b53e-81df-4a69-82c4-f4cb9587f529 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T20:11:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:11:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"25860bd5-709d-44c5-9d7b-1497e3ab97d1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:11:49Z" name: deployer-dockercfg-9wj8v namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 25860bd5-709d-44c5-9d7b-1497e3ab97d1 resourceVersion: "4092" uid: 600e3c7b-a77a-4aaa-95aa-4b05791b5555 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T20:17:15Z" service.beta.openshift.io/expiry: "2028-04-16T20:17:15Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: f83decd5-2792-44ba-9390-6bc7746dd304 creationTimestamp: "2026-04-17T20:17:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"f83decd5-2792-44ba-9390-6bc7746dd304"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T20:17:16Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: f83decd5-2792-44ba-9390-6bc7746dd304 resourceVersion: "7656" uid: f98e990e-5590-48a4-89a8-2e4709f4e5c2 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-17T20:11:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6224d726-3292-4eb4-8d7b-b70125e74e29"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:11:43Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:11:44Z" name: dns-dockercfg-x9tzj namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 6224d726-3292-4eb4-8d7b-b70125e74e29 resourceVersion: "3520" uid: 6db0dcba-0990-417f-9c8f-fcffe52f50c6 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-17T20:11:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0df36fd7-3b77-46a6-9091-1ca8e10b24ea"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:11:43Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:11:44Z" name: node-resolver-dockercfg-cv7rk namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 0df36fd7-3b77-46a6-9091-1ca8e10b24ea resourceVersion: "3524" uid: 12470386-397e-49c6-81bc-b16584be52e4 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "26933"