--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T14:49:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:49:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8c5bd358-8eca-42bf-a357-028a487b0306"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:36Z" name: builder-dockercfg-nnh45 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 8c5bd358-8eca-42bf-a357-028a487b0306 resourceVersion: "4310" uid: dfce5371-76a3-498e-ad5e-a4d68af9a9b4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T14:49:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4c79cbe1-5a2a-4ae1-8eb6-e0196b38ed5e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:49:31Z" name: default-dockercfg-wxrnj namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 4c79cbe1-5a2a-4ae1-8eb6-e0196b38ed5e resourceVersion: "3702" uid: 23c85534-1b6f-461b-91f6-03c8b037306d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T14:49:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:49:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"227a252d-ff13-4174-9ca9-2affce5ac571"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:36Z" name: deployer-dockercfg-4zxs7 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 227a252d-ff13-4174-9ca9-2affce5ac571 resourceVersion: "4309" uid: e8880bfd-1733-4c3d-9d6b-251af9aa9bcb type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T14:54:49Z" service.beta.openshift.io/expiry: "2028-04-15T14:54:49Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 259020fd-2169-410f-8ad9-d3f06e36416f creationTimestamp: "2026-04-16T14:54:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"259020fd-2169-410f-8ad9-d3f06e36416f"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T14:54:50Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 259020fd-2169-410f-8ad9-d3f06e36416f resourceVersion: "7736" uid: d6cc393e-7e4e-4f14-8ea3-cb4be92f034d type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-16T14:49:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0edca282-7170-4ad4-b560-7958d378dc0a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:49:31Z" name: dns-dockercfg-njff8 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 0edca282-7170-4ad4-b560-7958d378dc0a resourceVersion: "3704" uid: c6ddce50-def8-4508-a20e-d964b205f95e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-16T14:49:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d2b1831d-5884-40b9-a1e8-1b1c11976a1f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:49:31Z" name: node-resolver-dockercfg-cj8gs namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: d2b1831d-5884-40b9-a1e8-1b1c11976a1f resourceVersion: "3709" uid: f025278b-25b7-4f81-9efa-00606f17b465 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21472"