--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T16:35:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"39e7463c-ff6d-48fc-8b34-9f72e19c7180"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T16:35:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T17:11:38Z" name: builder-dockercfg-cz5tt namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 39e7463c-ff6d-48fc-8b34-9f72e19c7180 resourceVersion: "37494" uid: e5bcf9a7-5b90-45ca-a4f3-feead32f3947 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T16:35:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bd2a70e7-cdf9-44be-9753-30a34399fff0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T16:35:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T17:11:32Z" name: default-dockercfg-qnzpn namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: bd2a70e7-cdf9-44be-9753-30a34399fff0 resourceVersion: "37246" uid: a501c785-eed8-4ca0-be01-4c99ee7c37df type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T16:35:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"80e48908-601d-474e-baa1-ca3f2c397f26"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T16:35:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T17:11:38Z" name: deployer-dockercfg-78sfh namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 80e48908-601d-474e-baa1-ca3f2c397f26 resourceVersion: "37489" uid: 73e8ac58-8df5-48f7-9849-55a5746931bd type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T16:41:43Z" service.beta.openshift.io/expiry: "2028-04-23T16:41:43Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: fdb20094-a9ea-4f00-b3ac-5ff816bf3758 creationTimestamp: "2026-04-24T16:41:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"fdb20094-a9ea-4f00-b3ac-5ff816bf3758"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T16:41:44Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: fdb20094-a9ea-4f00-b3ac-5ff816bf3758 resourceVersion: "8011" uid: 5b283d4c-22fd-4555-b1cf-b0f6818e5d95 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-24T16:35:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"974e7a7f-3e7c-45e4-b4e0-01a389f046e2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T16:35:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T17:11:32Z" name: dns-dockercfg-ljxll namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 974e7a7f-3e7c-45e4-b4e0-01a389f046e2 resourceVersion: "37242" uid: 312a9bda-8a2f-4c82-bae9-00caa5698d30 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-24T16:35:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d7380693-1a0b-4cf5-abf9-dfdca8707f2c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T16:35:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T17:11:32Z" name: node-resolver-dockercfg-qvpdb namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: d7380693-1a0b-4cf5-abf9-dfdca8707f2c resourceVersion: "37254" uid: f398ca0b-ef92-4270-8113-62f0aac45543 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "50521"