--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T18:42:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"65fc46ba-c0ad-4f0a-94ae-44c6df9c0b7f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:42:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:09Z" name: builder-dockercfg-gnxc8 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 65fc46ba-c0ad-4f0a-94ae-44c6df9c0b7f resourceVersion: "26270" uid: a68635eb-0af5-4a36-8c2e-43938d804f09 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T18:42:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c95bced4-89eb-4a56-893b-f64d10c9ae11"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:42:56Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:07Z" name: default-dockercfg-z6dsh namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: c95bced4-89eb-4a56-893b-f64d10c9ae11 resourceVersion: "26177" uid: 269e8556-8d0d-443f-b340-7b2b397df236 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T18:42:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"123929b3-9d94-4571-9706-888d2d5fd144"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:42:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:09Z" name: deployer-dockercfg-x6klr namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 123929b3-9d94-4571-9706-888d2d5fd144 resourceVersion: "26258" uid: 8d4e3228-778e-46c8-ac23-18feb62bcbf4 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T18:48:43Z" service.beta.openshift.io/expiry: "2028-04-21T18:48:43Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 879955d5-4105-474a-929e-f25d59c5a316 creationTimestamp: "2026-04-22T18:48:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"879955d5-4105-474a-929e-f25d59c5a316"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T18:48:44Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 879955d5-4105-474a-929e-f25d59c5a316 resourceVersion: "7701" uid: 12b03be6-bfac-423c-97d3-d453558dd8a0 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-22T18:42:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"349630d0-2387-4ed9-8ce2-4fe2a42039ad"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:42:56Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:07Z" name: dns-dockercfg-ctxn4 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 349630d0-2387-4ed9-8ce2-4fe2a42039ad resourceVersion: "26087" uid: 125583ab-9d60-42e8-beb2-0a689c7b80e3 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-22T18:42:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"aae34c0f-1ea0-4cc4-a29b-0bc7fdf812b8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:42:56Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:07Z" name: node-resolver-dockercfg-8kt4h namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: aae34c0f-1ea0-4cc4-a29b-0bc7fdf812b8 resourceVersion: "26067" uid: 80858cb3-65f8-40b4-9eb5-a0f27eb1bac6 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "33179"