--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T17:31:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"76fa7281-acdb-49b4-8bc0-a4741fec131e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:31:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:43:34Z" name: builder-dockercfg-nfb84 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 76fa7281-acdb-49b4-8bc0-a4741fec131e resourceVersion: "38410" uid: 60846d0d-2d80-449b-aff6-1297fd892de2 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T17:31:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"37414c11-5b85-42d2-aff2-817c90fed4f9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:31:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:43:29Z" name: default-dockercfg-m44w8 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 37414c11-5b85-42d2-aff2-817c90fed4f9 resourceVersion: "38245" uid: bca9a0cb-25b4-4d3e-8bc5-7473b34af76f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T17:31:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"05077770-f831-4964-b5d4-d792e70b8417"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:31:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:43:34Z" name: deployer-dockercfg-bw922 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 05077770-f831-4964-b5d4-d792e70b8417 resourceVersion: "38407" uid: 238fc096-c54c-44c0-9caf-bcca744490ab type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T17:37:24Z" service.beta.openshift.io/expiry: "2028-04-21T17:37:24Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 8d04482c-8e18-4fa9-9100-28671c6409b5 creationTimestamp: "2026-04-22T17:37:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"8d04482c-8e18-4fa9-9100-28671c6409b5"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T17:37:25Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 8d04482c-8e18-4fa9-9100-28671c6409b5 resourceVersion: "7729" uid: aa9994a8-1cb4-4e6b-9463-93f3453e52a1 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-22T17:31:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d0324a50-7992-4d1a-840f-054031fe6ddb"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:31:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:43:29Z" name: dns-dockercfg-m6rcd namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: d0324a50-7992-4d1a-840f-054031fe6ddb resourceVersion: "38256" uid: 7bdff328-5811-421b-b621-81b1c2430be2 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-22T17:31:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6af528ea-cc3a-426c-a347-fdb3a1208661"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:31:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:43:30Z" name: node-resolver-dockercfg-ptgzc namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 6af528ea-cc3a-426c-a347-fdb3a1208661 resourceVersion: "38287" uid: 4568e9e2-c0ff-4c03-947a-f0124ef475ca type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "38960"