--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-28T19:13:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"015eb1c0-ca26-429e-8fc6-88763121d76f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-28T19:13:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-28T19:49:15Z" name: builder-dockercfg-4lfq7 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 015eb1c0-ca26-429e-8fc6-88763121d76f resourceVersion: "36105" uid: 39b5f126-9054-4f1f-8623-7e4c7aa16ee0 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-28T19:13:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a1df084d-8618-4f6d-9031-6b1650b92b35"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-28T19:13:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-28T19:49:10Z" name: default-dockercfg-2n4h4 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: a1df084d-8618-4f6d-9031-6b1650b92b35 resourceVersion: "35858" uid: 1035ac50-aea3-4d1b-8245-be7ba3e18680 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-28T19:13:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2729dca3-58aa-49f6-9e54-98e0693b0ba8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-28T19:13:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-28T19:49:15Z" name: deployer-dockercfg-fg2m4 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 2729dca3-58aa-49f6-9e54-98e0693b0ba8 resourceVersion: "36107" uid: 5d45fa7b-87fe-4e51-9bbb-72b749dc50a0 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-27T19:16:35Z" service.beta.openshift.io/expiry: "2028-04-27T19:16:35Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 6cdb8234-357f-4a62-941a-9d6e0bc92e64 creationTimestamp: "2026-04-28T19:16:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"6cdb8234-357f-4a62-941a-9d6e0bc92e64"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-28T19:16:35Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 6cdb8234-357f-4a62-941a-9d6e0bc92e64 resourceVersion: "6676" uid: b12c69d5-0c18-4aa6-8e09-6f17027d9f13 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-28T19:13:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a09a08aa-5ac2-457a-8b31-714d6f57bc71"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-28T19:13:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-28T19:49:10Z" name: dns-dockercfg-xdh6h namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: a09a08aa-5ac2-457a-8b31-714d6f57bc71 resourceVersion: "35857" uid: a6ea49b0-2e66-452c-9c46-5b1e288236d9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-28T19:13:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"23ec8721-1cb7-4018-9286-81c170392755"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-28T19:13:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-28T19:49:10Z" name: node-resolver-dockercfg-4z7ww namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 23ec8721-1cb7-4018-9286-81c170392755 resourceVersion: "35860" uid: 46fa1705-c4d9-410b-9c85-c753212367ae type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "64145"