--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T16:21:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bcdc30cb-b960-4434-a6b4-66048e203b77"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T16:21:33Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T16:57:33Z" name: builder-dockercfg-mn592 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: bcdc30cb-b960-4434-a6b4-66048e203b77 resourceVersion: "24086" uid: 46ce3707-86a5-4310-9d80-25dcf4b772ef type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T16:21:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cf31ef51-d9e6-4434-a7bc-9809dd35148f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T16:21:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T16:57:28Z" name: default-dockercfg-m9c56 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: cf31ef51-d9e6-4434-a7bc-9809dd35148f resourceVersion: "23946" uid: 527f9df9-4dbe-4a27-aba6-4be975926527 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T16:21:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ba0b7156-3095-47f1-bc9a-89e09f1cbe5b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T16:21:33Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T16:57:33Z" name: deployer-dockercfg-rbhd9 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: ba0b7156-3095-47f1-bc9a-89e09f1cbe5b resourceVersion: "24099" uid: ad41f170-ee50-4a8a-a131-2df917822f2b type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T16:24:37Z" service.beta.openshift.io/expiry: "2028-04-15T16:24:37Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 2069e469-11f0-477b-8e85-62a64db4c337 creationTimestamp: "2026-04-16T16:24:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"2069e469-11f0-477b-8e85-62a64db4c337"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T16:24:38Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 2069e469-11f0-477b-8e85-62a64db4c337 resourceVersion: "6907" uid: 05ce7778-5d5a-42eb-aba0-b01b071e4b78 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-16T16:21:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fc884b88-e621-4ace-9318-6b4a7d566556"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T16:21:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T16:57:28Z" name: dns-dockercfg-psw85 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: fc884b88-e621-4ace-9318-6b4a7d566556 resourceVersion: "23942" uid: 576c91af-3d61-4714-bdd4-e1032d3dc9fc type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-16T16:21:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e724ecef-4a41-4ca6-b89e-e526e0bbebd3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T16:21:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T16:57:28Z" name: node-resolver-dockercfg-84d79 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: e724ecef-4a41-4ca6-b89e-e526e0bbebd3 resourceVersion: "23938" uid: 89f04986-322d-4919-afc4-d9799882efd1 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "35286"