--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T23:50:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c7657ab8-3e2b-4970-aa3c-87082f0a1001"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T23:50:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-25T00:26:28Z" name: builder-dockercfg-49rkm namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: c7657ab8-3e2b-4970-aa3c-87082f0a1001 resourceVersion: "26545" uid: 1b9c5d74-1d90-4f1a-98b8-b6428754a41a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T23:50:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0b86f465-49d7-4526-90d9-022d7fc55ab7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T23:50:23Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-25T00:26:23Z" name: default-dockercfg-95fht namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 0b86f465-49d7-4526-90d9-022d7fc55ab7 resourceVersion: "26382" uid: 74c5e7d3-4930-4468-b2f1-dbe8cf0368cc type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T23:50:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c487c0dd-0d09-481e-a817-1f68df04e833"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T23:50:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-25T00:26:28Z" name: deployer-dockercfg-tvbf6 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: c487c0dd-0d09-481e-a817-1f68df04e833 resourceVersion: "26561" uid: 6657f023-aadc-490b-b31a-c24723283dd4 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T23:54:12Z" service.beta.openshift.io/expiry: "2028-04-23T23:54:12Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: f7152edd-3c1d-4c75-ac1c-7c92badac561 creationTimestamp: "2026-04-24T23:54:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"f7152edd-3c1d-4c75-ac1c-7c92badac561"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T23:54:13Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: f7152edd-3c1d-4c75-ac1c-7c92badac561 resourceVersion: "6567" uid: 8040699d-734e-4712-839d-defb14eaaf97 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-24T23:50:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a4bd7d61-1ef7-4ef5-baa1-fedcf08f48d5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T23:50:23Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-25T00:26:23Z" name: dns-dockercfg-xgj74 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: a4bd7d61-1ef7-4ef5-baa1-fedcf08f48d5 resourceVersion: "26364" uid: 23393fb6-d465-4a66-a4a2-7498743e9076 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-24T23:50:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2394a070-cb2d-4416-af5b-78fb7f28d45a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T23:50:23Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-25T00:26:23Z" name: node-resolver-dockercfg-d9czf namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 2394a070-cb2d-4416-af5b-78fb7f28d45a resourceVersion: "26394" uid: 279cd42c-f54c-4476-8836-32ac0010a308 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "32575"