--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T15:04:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:04:52Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b1204733-1275-4916-9a80-5f59d6e58a25"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:04:52Z" name: builder-dockercfg-x5v48 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: b1204733-1275-4916-9a80-5f59d6e58a25 resourceVersion: "3833" uid: 4f42f38e-dfd1-45c3-9218-76fb1837bf22 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T15:04:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:04:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f5508d21-5c5a-4760-a22d-d0072342ec75"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:04:47Z" name: default-dockercfg-t67x6 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: f5508d21-5c5a-4760-a22d-d0072342ec75 resourceVersion: "3108" uid: 6a03d924-469f-4460-ba9d-6c893420f7af type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T15:04:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:04:52Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cde5246b-db98-483c-9e51-830219585466"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:04:52Z" name: deployer-dockercfg-stlwc namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: cde5246b-db98-483c-9e51-830219585466 resourceVersion: "3827" uid: 86c743df-a66c-4d90-bdec-8de09b55d716 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T15:10:49Z" service.beta.openshift.io/expiry: "2028-04-21T15:10:49Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: e87e4016-ba36-45ef-bdbe-092e10ea67df creationTimestamp: "2026-04-22T15:10:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"e87e4016-ba36-45ef-bdbe-092e10ea67df"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T15:10:50Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: e87e4016-ba36-45ef-bdbe-092e10ea67df resourceVersion: "7836" uid: b45fccb4-7d5f-456c-b6fc-11cedacaaa13 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-22T15:04:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:04:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8fe07f37-2298-42dd-ae7f-5c58473bf535"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:04:47Z" name: dns-dockercfg-fkblf namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 8fe07f37-2298-42dd-ae7f-5c58473bf535 resourceVersion: "3115" uid: d755b9e6-af72-4164-9ba7-e1800b479a85 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-22T15:04:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:04:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ced7b5ea-d613-4e90-8037-d484b134cf09"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:04:47Z" name: node-resolver-dockercfg-b2fpn namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: ced7b5ea-d613-4e90-8037-d484b134cf09 resourceVersion: "3120" uid: 81692deb-fee5-4a4b-8e9c-b8aa7911ef31 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "18143"