--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-21T03:54:11Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"51ad2df3-b916-467f-9f4a-77ac93c360e2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T03:54:11Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T03:54:21Z" name: builder-dockercfg-rcf8f namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 51ad2df3-b916-467f-9f4a-77ac93c360e2 resourceVersion: "4233" uid: 40a082b5-f67d-4a4c-b88c-46b89844538f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-21T03:54:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2532217f-633f-43d7-a44d-e9f7d6d43cb5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T03:54:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T03:54:19Z" name: default-dockercfg-pgpc8 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 2532217f-633f-43d7-a44d-e9f7d6d43cb5 resourceVersion: "4067" uid: 123c3aa0-45f3-4008-bceb-3af7a3fe22ed type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-21T03:54:11Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0176b3a7-08c7-42bd-912b-e520f513af6e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T03:54:11Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T03:54:21Z" name: deployer-dockercfg-ftcm8 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 0176b3a7-08c7-42bd-912b-e520f513af6e resourceVersion: "4232" uid: ae223c22-8cc2-470c-9fd7-1cbf9a60220a type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T03:59:43Z" service.beta.openshift.io/expiry: "2028-04-20T03:59:43Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 2a36a57d-a949-4571-a943-e9ae544968a2 creationTimestamp: "2026-04-21T03:59:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"2a36a57d-a949-4571-a943-e9ae544968a2"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T03:59:44Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 2a36a57d-a949-4571-a943-e9ae544968a2 resourceVersion: "7657" uid: b095dedf-6eff-4854-b7e6-07a7e7823d97 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-21T03:54:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5b2f10b0-40f6-421f-8452-038573b6823e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T03:54:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T03:54:19Z" name: dns-dockercfg-7tx7c namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 5b2f10b0-40f6-421f-8452-038573b6823e resourceVersion: "4066" uid: dc966ea3-22b1-481d-b478-27c46fc5df4c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-21T03:54:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9141b764-dbb5-4e8a-a94f-afed3e2230c7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T03:54:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T03:54:19Z" name: node-resolver-dockercfg-mplvf namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 9141b764-dbb5-4e8a-a94f-afed3e2230c7 resourceVersion: "4069" uid: cd9405ac-9a50-4bd4-9575-1809fe138c52 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "25625"