--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T18:39:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:39:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"31469aab-af5a-4375-9b1d-1666d198a599"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:39:08Z" name: builder-dockercfg-pv742 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 31469aab-af5a-4375-9b1d-1666d198a599 resourceVersion: "3506" uid: 6aac0bd4-d9dc-4d4e-a77b-06cdfcce1895 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T18:39:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"dfff314b-2d8f-480b-bbab-2a2c1fd0fb7c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:39:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:39:04Z" name: default-dockercfg-2d5tt namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: dfff314b-2d8f-480b-bbab-2a2c1fd0fb7c resourceVersion: "2856" uid: 6b079d68-c9e2-4e52-b5e5-8a26536285d7 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T18:39:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:39:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c17c2e8c-71f8-4ef3-9986-814a58a403d7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:39:08Z" name: deployer-dockercfg-zd7rs namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: c17c2e8c-71f8-4ef3-9986-814a58a403d7 resourceVersion: "3500" uid: ca981d2c-d509-433e-a2a7-341cb97dfb4e type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T18:45:40Z" service.beta.openshift.io/expiry: "2028-04-21T18:45:40Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: fb9a6a14-4b03-4c8f-84a5-664df425c027 creationTimestamp: "2026-04-22T18:45:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"fb9a6a14-4b03-4c8f-84a5-664df425c027"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T18:45:40Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: fb9a6a14-4b03-4c8f-84a5-664df425c027 resourceVersion: "7997" uid: 440b0601-090c-4624-82fa-a9ec7cc2387b type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-22T18:39:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"aea99e0a-b3cd-423f-962d-9e6cc6453e37"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:39:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:39:04Z" name: dns-dockercfg-xcpp5 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: aea99e0a-b3cd-423f-962d-9e6cc6453e37 resourceVersion: "2863" uid: 1da28057-3a97-41f9-af64-98d60f700b69 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-22T18:39:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5e84b1d2-c05c-4a48-8aae-cd5d80eb2d07"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:39:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:39:04Z" name: node-resolver-dockercfg-8bdh6 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 5e84b1d2-c05c-4a48-8aae-cd5d80eb2d07 resourceVersion: "2882" uid: 75428505-334d-4a03-99b5-09299e9cefbd type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "26031"