--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-23T08:08:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T08:08:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d980b00d-38df-4d69-9878-885a8ce58ffc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T08:08:37Z" name: builder-dockercfg-vnxkz namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: d980b00d-38df-4d69-9878-885a8ce58ffc resourceVersion: "3942" uid: 6687e76a-3b0b-4640-b618-836baae12664 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-23T08:08:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T08:08:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"14c5395f-bd57-47e8-8b3f-6d0d1e44039c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T08:08:32Z" name: default-dockercfg-zwj9f namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 14c5395f-bd57-47e8-8b3f-6d0d1e44039c resourceVersion: "3191" uid: 91c427c9-2ae3-4d0e-b9c7-28e032daa404 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-23T08:08:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T08:08:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a1c61559-ec4c-4871-88ee-550c2cf7473b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T08:08:37Z" name: deployer-dockercfg-7mlj7 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: a1c61559-ec4c-4871-88ee-550c2cf7473b resourceVersion: "3956" uid: c99975aa-579c-4457-8744-c3c47bddc298 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-22T08:14:16Z" service.beta.openshift.io/expiry: "2028-04-22T08:14:16Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 8f517e92-6aff-4da9-b7d0-e6293b52c670 creationTimestamp: "2026-04-23T08:14:17Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"8f517e92-6aff-4da9-b7d0-e6293b52c670"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-23T08:14:17Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 8f517e92-6aff-4da9-b7d0-e6293b52c670 resourceVersion: "7648" uid: 1566331f-83c6-48b2-aa88-39dab16611e3 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-23T08:08:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T08:08:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d38b2579-f849-46f3-a472-235657d3678e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T08:08:32Z" name: dns-dockercfg-dcms6 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: d38b2579-f849-46f3-a472-235657d3678e resourceVersion: "3193" uid: c6d3f047-509d-4064-af78-a845883cce23 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-23T08:08:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T08:08:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ba76a9d8-3fc3-40dc-b6ee-27074b51e74b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T08:08:32Z" name: node-resolver-dockercfg-7qspq namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: ba76a9d8-3fc3-40dc-b6ee-27074b51e74b resourceVersion: "3209" uid: 377ad8ac-946d-404f-869e-4e0365c00f33 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "11710"