--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T17:20:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9d321d4f-61ef-4b29-85b2-7ed6fafb573b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:20:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:56:48Z" name: builder-dockercfg-vrrg6 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 9d321d4f-61ef-4b29-85b2-7ed6fafb573b resourceVersion: "39297" uid: da938613-c108-4cf7-a3dc-212790a99588 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T17:20:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a184a7e6-800c-4ec8-866d-dfb65f3c8877"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:20:43Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:56:43Z" name: default-dockercfg-htg6r namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: a184a7e6-800c-4ec8-866d-dfb65f3c8877 resourceVersion: "39097" uid: 6ca3b2bf-1067-4cd4-8802-aae398f0ef82 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T17:20:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ca4e4e14-000a-45e5-bb6f-552d1ca8a08d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:20:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:56:48Z" name: deployer-dockercfg-ptj7m namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: ca4e4e14-000a-45e5-bb6f-552d1ca8a08d resourceVersion: "39282" uid: e5e5ad49-b1d8-45c9-b887-14200d6874d6 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T17:25:03Z" service.beta.openshift.io/expiry: "2028-04-16T17:25:03Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: ed026456-89e7-43a8-aff2-4572f3226eb5 creationTimestamp: "2026-04-17T17:25:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"ed026456-89e7-43a8-aff2-4572f3226eb5"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T17:25:04Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: ed026456-89e7-43a8-aff2-4572f3226eb5 resourceVersion: "7336" uid: c8f3f273-2f90-40cf-9c1f-aa54d46f11a7 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-17T17:20:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"52306776-3279-4713-90a5-2f87d1509001"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:20:43Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:56:43Z" name: dns-dockercfg-cl7ph namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 52306776-3279-4713-90a5-2f87d1509001 resourceVersion: "39101" uid: 75fa3d8f-622d-4ebe-8f71-de3f39076f7c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-17T17:20:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"83ea9111-8b3e-4cb7-b817-af94f0d86cbd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:20:43Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:56:43Z" name: node-resolver-dockercfg-b926f namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 83ea9111-8b3e-4cb7-b817-af94f0d86cbd resourceVersion: "39112" uid: 4d6e716e-1183-4f07-a129-086e475870f4 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "40480"