--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T17:31:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d8aac0fb-524e-40d7-b53c-e7f7ca017d65"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:31:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:07:08Z" name: builder-dockercfg-f9gg6 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: d8aac0fb-524e-40d7-b53c-e7f7ca017d65 resourceVersion: "38258" uid: 4917c469-31ee-4140-bd80-f1d7e784bba6 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T17:31:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0a2a01f6-19e0-4b63-a8cf-5d822a0c6138"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:31:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:07:03Z" name: default-dockercfg-b4mhc namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 0a2a01f6-19e0-4b63-a8cf-5d822a0c6138 resourceVersion: "38085" uid: 98c11029-92fb-471f-a203-b0b53b50991f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T17:31:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5f04a97d-7ced-4c15-9484-57657e17f6d9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:31:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:07:08Z" name: deployer-dockercfg-s8cbz namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 5f04a97d-7ced-4c15-9484-57657e17f6d9 resourceVersion: "38265" uid: 3caa3f94-2989-4992-8645-f76677185c38 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T17:36:44Z" service.beta.openshift.io/expiry: "2028-04-21T17:36:44Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: f3674491-299e-4093-a114-2356a3a1b120 creationTimestamp: "2026-04-22T17:36:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"f3674491-299e-4093-a114-2356a3a1b120"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T17:36:45Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: f3674491-299e-4093-a114-2356a3a1b120 resourceVersion: "7773" uid: fcc7c18d-b2d5-4660-ae94-078424b96fff type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-22T17:31:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fe6d8af9-78ac-49ea-8a67-de1802b2d439"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:31:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:07:03Z" name: dns-dockercfg-7g4b5 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: fe6d8af9-78ac-49ea-8a67-de1802b2d439 resourceVersion: "38077" uid: ffa7ffb4-da8d-4a4f-9dd3-b8c34b658192 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-22T17:31:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6305a5e7-42a9-42a4-a940-98447784bb32"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:31:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:07:03Z" name: node-resolver-dockercfg-6fs2d namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 6305a5e7-42a9-42a4-a940-98447784bb32 resourceVersion: "38067" uid: b5d71fdb-ba16-4a80-aca8-1e02fbf7a733 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "40040"