--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T22:09:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"219b5323-2aac-4df0-937a-1a18db5b56a3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T22:09:56Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T22:45:57Z" name: builder-dockercfg-fx2kj namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 219b5323-2aac-4df0-937a-1a18db5b56a3 resourceVersion: "25617" uid: 169e85ce-e5ad-4a22-8be7-4a89e945d0ad type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T22:09:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"dd4e687b-754f-4405-a1b4-c184462a3b9b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T22:09:52Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T22:45:53Z" name: default-dockercfg-bzp85 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: dd4e687b-754f-4405-a1b4-c184462a3b9b resourceVersion: "25467" uid: 9e0d529e-d9f8-41de-951f-4315f67479cb type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T22:09:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4838f5f0-49db-482a-bf5d-36bd43c0020b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T22:09:56Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T22:45:57Z" name: deployer-dockercfg-2scpm namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 4838f5f0-49db-482a-bf5d-36bd43c0020b resourceVersion: "25618" uid: 714f2744-96cd-4c9f-940b-6303b50c13fa type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T22:16:09Z" service.beta.openshift.io/expiry: "2028-04-15T22:16:09Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 04c481ef-52c4-4fc2-b700-51834d7c406b creationTimestamp: "2026-04-16T22:16:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"04c481ef-52c4-4fc2-b700-51834d7c406b"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T22:16:10Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 04c481ef-52c4-4fc2-b700-51834d7c406b resourceVersion: "7864" uid: 0a0bb1a9-84cb-400d-abfb-e0c3cdc219dc type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-16T22:09:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"72d9ff58-bb40-4ce3-8295-1e95abbafa1b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T22:09:53Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T22:45:53Z" name: dns-dockercfg-66k94 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 72d9ff58-bb40-4ce3-8295-1e95abbafa1b resourceVersion: "25484" uid: fba9e0c6-35f6-489d-ac1a-e6148fc12cc6 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-16T22:09:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"59c3e05d-c650-473f-b983-e1648b556110"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T22:09:52Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T22:45:53Z" name: node-resolver-dockercfg-czb2r namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 59c3e05d-c650-473f-b983-e1648b556110 resourceVersion: "25475" uid: 4aab1d74-1a39-4a01-93c4-c7bf8f4bdf1f type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "33530"