--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T21:24:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"84e532fc-a64c-4e31-a2cf-33b786c73515"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:24:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T22:00:45Z" name: builder-dockercfg-njmdk namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 84e532fc-a64c-4e31-a2cf-33b786c73515 resourceVersion: "26782" uid: f9636667-8a92-4817-9419-2235cf01d00a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T21:24:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"05fcfdf9-b7fa-40e1-9437-fa0d2b932754"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:24:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T22:00:39Z" name: default-dockercfg-v9wc8 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 05fcfdf9-b7fa-40e1-9437-fa0d2b932754 resourceVersion: "26560" uid: 351a5edd-4b1d-46c4-a781-2de6247d760b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T21:24:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bf21914b-f629-4657-b6c1-0b8211e9b767"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:24:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T22:00:45Z" name: deployer-dockercfg-5fxk6 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: bf21914b-f629-4657-b6c1-0b8211e9b767 resourceVersion: "26787" uid: ad009d2b-d892-4fd8-9d83-8813b4b4fcd5 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T21:28:03Z" service.beta.openshift.io/expiry: "2028-04-23T21:28:03Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: a930d2d4-579b-4c46-bca5-f11bd5b5aab7 creationTimestamp: "2026-04-24T21:28:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"a930d2d4-579b-4c46-bca5-f11bd5b5aab7"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T21:28:04Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: a930d2d4-579b-4c46-bca5-f11bd5b5aab7 resourceVersion: "7246" uid: 9f7a0859-0140-4dc1-ba2b-dd146789617a type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-24T21:24:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e53ad0f7-a2f0-409f-a9a2-f83ffdacf78b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:24:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T22:00:39Z" name: dns-dockercfg-wtdzs namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: e53ad0f7-a2f0-409f-a9a2-f83ffdacf78b resourceVersion: "26565" uid: 5dc2a3aa-264f-4c6b-a09a-ba8ab13f3dc3 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-24T21:24:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8a78aac2-a55c-415e-be3f-d4d859272bc5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:24:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T22:00:39Z" name: node-resolver-dockercfg-8knfc namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 8a78aac2-a55c-415e-be3f-d4d859272bc5 resourceVersion: "26577" uid: 8b2ee6f4-d0e1-4765-ba42-8dd2a8d731b6 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "32632"