--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T17:30:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"092635e4-6502-43be-8c65-99b60ecba961"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:30:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:42:39Z" name: builder-dockercfg-7h77q namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 092635e4-6502-43be-8c65-99b60ecba961 resourceVersion: "38581" uid: 18717376-dfa4-4ca9-a228-5cf793c74f02 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T17:30:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f4dbf365-7b47-4ce2-bbbf-4d1d80489a95"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:30:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:42:34Z" name: default-dockercfg-cjmmt namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: f4dbf365-7b47-4ce2-bbbf-4d1d80489a95 resourceVersion: "38408" uid: 19449a83-6d9e-463c-8d51-b389ee140ad9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T17:30:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4fcecc4b-a87b-4a03-980b-77d3b33aa915"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:30:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:42:39Z" name: deployer-dockercfg-8rv4s namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 4fcecc4b-a87b-4a03-980b-77d3b33aa915 resourceVersion: "38583" uid: b816a6a4-312c-4de3-b19d-951f338e1acd type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T17:34:24Z" service.beta.openshift.io/expiry: "2028-04-21T17:34:24Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 981b4db8-fd43-4731-a839-22e277932689 creationTimestamp: "2026-04-22T17:34:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"981b4db8-fd43-4731-a839-22e277932689"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T17:34:25Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 981b4db8-fd43-4731-a839-22e277932689 resourceVersion: "6238" uid: 6ee10239-418d-4f7e-84db-db5f15267b1a type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-22T17:30:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4fc1bd61-85d2-4ce5-938b-7c5fdca99426"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:30:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:42:34Z" name: dns-dockercfg-ghfnt namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 4fc1bd61-85d2-4ce5-938b-7c5fdca99426 resourceVersion: "38394" uid: 54359d95-a6f8-4111-ad9b-3deae01df092 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-22T17:30:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7610736c-6ff6-4905-b2bf-d44cf8391a72"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:30:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:42:34Z" name: node-resolver-dockercfg-jcmgh namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 7610736c-6ff6-4905-b2bf-d44cf8391a72 resourceVersion: "38374" uid: 1aa76e92-4b0a-4ccf-90b2-fc321c76317c type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "48060"