--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T13:55:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"faf1e62c-0b66-4e8c-b4e1-3458b858c7a6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:55:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:31:32Z" name: builder-dockercfg-j2zdc namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: faf1e62c-0b66-4e8c-b4e1-3458b858c7a6 resourceVersion: "26258" uid: cf1c09f4-96e0-4cff-b39f-aad66e4a4df8 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T13:55:11Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a2614933-b715-4aa0-8246-c3cd383a5018"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:55:11Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:31:30Z" name: default-dockercfg-b8xcd namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: a2614933-b715-4aa0-8246-c3cd383a5018 resourceVersion: "26034" uid: 14f84c43-3c50-419e-99b1-ff2192a4ebe0 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T13:55:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"36c70650-6d15-4d42-b058-9546911dfe18"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:55:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:31:32Z" name: deployer-dockercfg-stvbt namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 36c70650-6d15-4d42-b058-9546911dfe18 resourceVersion: "26246" uid: db77a407-5caf-403b-8486-c81f4a36e4e7 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T13:59:54Z" service.beta.openshift.io/expiry: "2028-04-15T13:59:54Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: ef2434da-8949-4c8b-ae73-a6871882adff creationTimestamp: "2026-04-16T13:59:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"ef2434da-8949-4c8b-ae73-a6871882adff"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T13:59:55Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: ef2434da-8949-4c8b-ae73-a6871882adff resourceVersion: "7040" uid: fa675682-eadf-46d3-bdfa-9945f4d5ab57 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-16T13:55:11Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"39ffdeba-6a2a-44d6-85fd-b86a706e50a9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:55:11Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:31:30Z" name: dns-dockercfg-pfkw7 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 39ffdeba-6a2a-44d6-85fd-b86a706e50a9 resourceVersion: "26081" uid: 6a6f095f-f1d0-406e-9028-292768540c01 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-16T13:55:11Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0fcdc432-9db4-413e-aa7c-1ef6d4224c6b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:55:11Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:31:30Z" name: node-resolver-dockercfg-h5c4g namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 0fcdc432-9db4-413e-aa7c-1ef6d4224c6b resourceVersion: "26032" uid: 778a8295-fda0-479e-b90c-5adec360d9a7 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "33197"