--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T23:49:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8e9bda3d-65fa-4e65-91b3-79cf0c045020"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T23:49:45Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T23:50:09Z" name: builder-dockercfg-dzkhl namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 8e9bda3d-65fa-4e65-91b3-79cf0c045020 resourceVersion: "4168" uid: 8b626389-ee26-48a9-ba46-7f7dd01dcece type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T23:49:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9df4d2ce-6e67-46ab-a80c-f522abb1d805"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T23:49:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T23:50:07Z" name: default-dockercfg-l5g4x namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 9df4d2ce-6e67-46ab-a80c-f522abb1d805 resourceVersion: "4034" uid: 64e59afc-866a-413f-9a90-554b8d7135ef type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T23:49:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9f703ccb-a6bc-4e04-9f7e-4827392fbf3b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T23:49:45Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T23:50:09Z" name: deployer-dockercfg-g659d namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 9f703ccb-a6bc-4e04-9f7e-4827392fbf3b resourceVersion: "4169" uid: cb53606e-bda7-4dee-8587-21fb2b3d773c type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T23:55:59Z" service.beta.openshift.io/expiry: "2028-04-23T23:55:59Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 3935c9ac-b049-40e8-9083-3faa2e36a5a0 creationTimestamp: "2026-04-24T23:56:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"3935c9ac-b049-40e8-9083-3faa2e36a5a0"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T23:56:00Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 3935c9ac-b049-40e8-9083-3faa2e36a5a0 resourceVersion: "7945" uid: 00478ae4-b542-4eb4-83c2-c8bbbde98a3d type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-24T23:49:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"23913d4f-c286-4d63-881e-830187bb25db"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T23:49:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T23:50:07Z" name: dns-dockercfg-ktrpk namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 23913d4f-c286-4d63-881e-830187bb25db resourceVersion: "4031" uid: 5e2f417b-c9f8-40f3-a899-c5be4f43fc3f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-24T23:49:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"594f140d-9608-430e-9279-85ed4649ce36"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T23:49:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T23:50:07Z" name: node-resolver-dockercfg-qc7t9 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 594f140d-9608-430e-9279-85ed4649ce36 resourceVersion: "4036" uid: dc31a82f-0cf8-4425-92b2-5c9eabff091b type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "22001"