--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T22:26:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a6caf3ec-b06e-4e3b-a287-e1eb3213cba8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T22:26:25Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T22:26:54Z" name: builder-dockercfg-g9r9k namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: a6caf3ec-b06e-4e3b-a287-e1eb3213cba8 resourceVersion: "4094" uid: 36d9752c-e900-4bf8-b78c-cc3a3a9fdfde type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T22:26:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"625249be-452e-4e1e-a940-a666588da787"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T22:26:23Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T22:26:53Z" name: default-dockercfg-d8z9m namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 625249be-452e-4e1e-a940-a666588da787 resourceVersion: "3961" uid: 94be9afc-08bf-4284-b5cb-16523e177dd4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T22:26:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8a0958b9-8aa7-4650-8549-7dcea92560ea"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T22:26:25Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T22:26:54Z" name: deployer-dockercfg-l4v7f namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 8a0958b9-8aa7-4650-8549-7dcea92560ea resourceVersion: "4093" uid: e79bca16-f8f7-4d29-a816-7d32ca1cb2bf type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T22:30:25Z" service.beta.openshift.io/expiry: "2028-04-23T22:30:25Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 88c8ce0c-cb66-40a3-92d0-3c1934c59468 creationTimestamp: "2026-04-24T22:30:26Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"88c8ce0c-cb66-40a3-92d0-3c1934c59468"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T22:30:26Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 88c8ce0c-cb66-40a3-92d0-3c1934c59468 resourceVersion: "7247" uid: 2f600c53-1afd-4ee3-add5-aa0076d6039c type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-24T22:26:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3675b154-09c0-4475-ab7e-27d1496b649c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T22:26:23Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T22:26:53Z" name: dns-dockercfg-qwslk namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 3675b154-09c0-4475-ab7e-27d1496b649c resourceVersion: "3964" uid: 1267b1d7-ec01-463d-877b-210c71e4d1ec type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-24T22:26:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"80bbf89a-01f8-4cf4-b0f5-9705d75b0bad"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T22:26:23Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T22:26:53Z" name: node-resolver-dockercfg-bcxh4 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 80bbf89a-01f8-4cf4-b0f5-9705d75b0bad resourceVersion: "3963" uid: 24e76698-11c0-4291-81f4-07154a1d96fb type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "20332"