--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T16:19:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"efdf50a6-72e7-4069-aecc-a739222f2be0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T16:19:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T16:55:09Z" name: builder-dockercfg-cf74t namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: efdf50a6-72e7-4069-aecc-a739222f2be0 resourceVersion: "38078" uid: c38d5cc9-3dbe-44a0-a9cc-1e6345416e4d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T16:19:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ab4aa0e2-8082-4a18-a6fe-7449f5122019"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T16:19:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T16:55:03Z" name: default-dockercfg-gs89k namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: ab4aa0e2-8082-4a18-a6fe-7449f5122019 resourceVersion: "37846" uid: 49e2dbc6-ccd1-4942-b492-63febeac23af type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T16:19:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d6ab24ce-8884-4c68-984b-aa9e0a0dffbb"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T16:19:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T16:55:09Z" name: deployer-dockercfg-mnd2m namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: d6ab24ce-8884-4c68-984b-aa9e0a0dffbb resourceVersion: "38072" uid: 9deeac05-9acf-4a39-bdb6-e1d14d877b4f type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T16:24:47Z" service.beta.openshift.io/expiry: "2028-04-15T16:24:47Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 208a0f0a-217f-49f6-a5fe-460fa8bab122 creationTimestamp: "2026-04-16T16:24:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"208a0f0a-217f-49f6-a5fe-460fa8bab122"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T16:24:47Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 208a0f0a-217f-49f6-a5fe-460fa8bab122 resourceVersion: "7773" uid: 7bf52d94-3ed8-41c7-8784-a6f739879e6e type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-16T16:19:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"01857736-be48-4112-b15a-7c4fce76c3fe"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T16:19:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T16:55:03Z" name: dns-dockercfg-2bd8s namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 01857736-be48-4112-b15a-7c4fce76c3fe resourceVersion: "37845" uid: 5e08ca51-400c-414e-a158-30a9932f643c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-16T16:19:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cae2f6fd-1992-40de-97cb-ba6c31a4d6ae"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T16:19:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T16:55:03Z" name: node-resolver-dockercfg-dnx9b namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: cae2f6fd-1992-40de-97cb-ba6c31a4d6ae resourceVersion: "37860" uid: ac205faa-342a-49a3-94e0-b0906f564335 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "38644"