--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T22:09:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e06176fa-5ccc-4359-ae85-8c2ae42e268a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T22:09:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T22:10:00Z" name: builder-dockercfg-t6275 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: e06176fa-5ccc-4359-ae85-8c2ae42e268a resourceVersion: "4191" uid: 522a561a-57f3-419b-b3a2-112220c0edd4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T22:09:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T22:09:55Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bcd492ac-739d-4ed1-87cc-deb07cb81453"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T22:09:55Z" name: default-dockercfg-qdwcs namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: bcd492ac-739d-4ed1-87cc-deb07cb81453 resourceVersion: "3555" uid: 36d749a5-e058-41f4-9306-ec1170126853 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T22:09:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2abb54e5-b36a-49d3-9f43-1d8a4237c1be"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T22:09:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T22:10:00Z" name: deployer-dockercfg-wkrbp namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 2abb54e5-b36a-49d3-9f43-1d8a4237c1be resourceVersion: "4195" uid: 34e5d5b7-f851-49eb-9dea-3dd3d87ea8ef type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T22:15:32Z" service.beta.openshift.io/expiry: "2028-04-15T22:15:32Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 85bebd70-1914-4994-a209-3cf96fe62dcd creationTimestamp: "2026-04-16T22:15:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"85bebd70-1914-4994-a209-3cf96fe62dcd"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T22:15:33Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 85bebd70-1914-4994-a209-3cf96fe62dcd resourceVersion: "7751" uid: 6fade3b7-ae5f-4f0c-a6b7-2bbbd12a1d76 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-16T22:09:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T22:09:55Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7bfeee6a-3f93-44b4-a438-dc4daf25254a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T22:09:55Z" name: dns-dockercfg-nlsdl namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 7bfeee6a-3f93-44b4-a438-dc4daf25254a resourceVersion: "3556" uid: aa405de7-1ab5-485a-bb1c-277ba33593f1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-16T22:09:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T22:09:55Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"763779ed-ab02-4357-8d07-64f34fb81050"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T22:09:55Z" name: node-resolver-dockercfg-k442x namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 763779ed-ab02-4357-8d07-64f34fb81050 resourceVersion: "3567" uid: 4ef401df-5891-42ff-bdca-df5f44cc45e4 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "36561"