--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T16:36:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8534726f-9b86-425b-a05d-42ee60451d8a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T16:36:13Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T17:12:17Z" name: builder-dockercfg-z6b6v namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 8534726f-9b86-425b-a05d-42ee60451d8a resourceVersion: "26535" uid: e24e22c5-94fa-4ef0-8a57-7442d08e8a08 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T16:36:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bba1f698-1769-4806-a82f-3c109446146a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T16:36:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T17:12:14Z" name: default-dockercfg-7tnkt namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: bba1f698-1769-4806-a82f-3c109446146a resourceVersion: "26409" uid: 5d06b3e7-3321-4b7e-8349-cc2b5de169ff type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T16:36:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7234549b-e338-4eac-86a6-c1a17f15000e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T16:36:13Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T17:12:17Z" name: deployer-dockercfg-4f9dg namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 7234549b-e338-4eac-86a6-c1a17f15000e resourceVersion: "26530" uid: bc5dd566-2846-421c-80d5-34a1faf072be type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T16:39:41Z" service.beta.openshift.io/expiry: "2028-04-23T16:39:41Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: d60e5688-43b7-4af4-8469-fdeaaa7a7cb2 creationTimestamp: "2026-04-24T16:39:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"d60e5688-43b7-4af4-8469-fdeaaa7a7cb2"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T16:39:42Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: d60e5688-43b7-4af4-8469-fdeaaa7a7cb2 resourceVersion: "6658" uid: c78ee430-0fbd-4d60-ab45-7e46de0a93df type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-24T16:36:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bdbca74c-e4d7-4b93-80f8-49401f153fb0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T16:36:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T17:12:14Z" name: dns-dockercfg-x6pvx namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: bdbca74c-e4d7-4b93-80f8-49401f153fb0 resourceVersion: "26405" uid: 73019885-948c-4bb7-baf1-69ed1fe41589 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-24T16:36:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b6e5741d-98c9-4ed2-8465-b64adfef4e24"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T16:36:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T17:12:14Z" name: node-resolver-dockercfg-vbkkw namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: b6e5741d-98c9-4ed2-8465-b64adfef4e24 resourceVersion: "26393" uid: f83a23ed-3d83-48a4-bd6f-dad220a45fdd type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "32320"