--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T13:55:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"aa5c1422-d2ce-495c-a565-6b01dd8300bb"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:55:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:55:49Z" name: builder-dockercfg-7c6jp namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: aa5c1422-d2ce-495c-a565-6b01dd8300bb resourceVersion: "4134" uid: f394ebc5-1a24-485e-b80f-75c8d024167d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T13:55:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:55:43Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"52e36439-2be8-4402-91e3-043c0b1f0319"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:55:43Z" name: default-dockercfg-fdsct namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 52e36439-2be8-4402-91e3-043c0b1f0319 resourceVersion: "3548" uid: 860b1421-c1a2-495d-9e7b-55b6134ad01e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T13:55:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6cf22609-da76-4ac8-9b54-e3064a26be1c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:55:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:55:49Z" name: deployer-dockercfg-7kbsf namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 6cf22609-da76-4ac8-9b54-e3064a26be1c resourceVersion: "4132" uid: d26d4c57-f502-4ab5-87be-3a5b001bdfa0 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T14:01:11Z" service.beta.openshift.io/expiry: "2028-04-15T14:01:11Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 5dbd62f1-47a4-490f-8a19-6378ce8aee41 creationTimestamp: "2026-04-16T14:01:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"5dbd62f1-47a4-490f-8a19-6378ce8aee41"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T14:01:12Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 5dbd62f1-47a4-490f-8a19-6378ce8aee41 resourceVersion: "7778" uid: 0c4ea7c7-26d0-4568-99c4-d7449c41702d type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-16T13:55:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:55:43Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"80645b70-5b85-47d3-b47c-643cbfafe1ff"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:55:43Z" name: dns-dockercfg-2c9fp namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 80645b70-5b85-47d3-b47c-643cbfafe1ff resourceVersion: "3566" uid: 039f7948-74ef-43ab-bd9c-ffdcc7dce680 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-16T13:55:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"81e19243-e56b-495c-9b6f-12d359c77050"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:55:43Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:55:44Z" name: node-resolver-dockercfg-9rq89 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 81e19243-e56b-495c-9b6f-12d359c77050 resourceVersion: "3567" uid: 50bc4830-2a8e-4705-83ad-c09f43f7c667 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21100"