--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T16:19:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T16:19:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7fbab19a-0494-430b-a292-6eb4a76ba35c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T16:19:44Z" name: builder-dockercfg-fpvcc namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 7fbab19a-0494-430b-a292-6eb4a76ba35c resourceVersion: "3733" uid: fd92cc90-03fc-4b11-9e9a-a581b84d8217 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T16:19:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T16:19:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ed3d67e6-ab5f-4f88-911f-5b495f271a8d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T16:19:39Z" name: default-dockercfg-w84w8 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: ed3d67e6-ab5f-4f88-911f-5b495f271a8d resourceVersion: "3004" uid: 780a3bba-a247-4245-bc1e-6cfbfe116384 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T16:19:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T16:19:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cb7bee7b-1524-4c20-8151-6b520c50b7ab"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T16:19:44Z" name: deployer-dockercfg-wt4cx namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: cb7bee7b-1524-4c20-8151-6b520c50b7ab resourceVersion: "3737" uid: 1f68ba62-258d-4d9c-8960-3dcbf2fdcc32 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T16:25:46Z" service.beta.openshift.io/expiry: "2028-04-19T16:25:46Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 0a2b09bf-2dd1-4eaf-bea6-b499e4afe2de creationTimestamp: "2026-04-20T16:25:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"0a2b09bf-2dd1-4eaf-bea6-b499e4afe2de"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T16:25:47Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 0a2b09bf-2dd1-4eaf-bea6-b499e4afe2de resourceVersion: "7857" uid: aa271cfc-4f0e-4d76-89b8-a6be72b63e1d type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-20T16:19:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T16:19:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4849e4e5-e831-42ce-a782-9f69c4aacda8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T16:19:39Z" name: dns-dockercfg-rqfxd namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 4849e4e5-e831-42ce-a782-9f69c4aacda8 resourceVersion: "3024" uid: 54f2d033-7f4f-45d6-9fe8-a9b583271e56 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-20T16:19:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T16:19:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e43fd8a7-08d5-4c33-ae4c-e55cb497b430"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T16:19:39Z" name: node-resolver-dockercfg-4bn2x namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: e43fd8a7-08d5-4c33-ae4c-e55cb497b430 resourceVersion: "3026" uid: 22e1e06f-0fae-4d01-b6fe-df3677d2f7e4 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "27978"