--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T22:10:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d18b2e3e-53a8-4cb0-a2c8-a55df7dcba8a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T22:10:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T22:46:37Z" name: builder-dockercfg-7mdz2 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: d18b2e3e-53a8-4cb0-a2c8-a55df7dcba8a resourceVersion: "25876" uid: d5335958-99fb-43af-a89a-5eb69f9df3b5 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T22:10:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"42c549bb-7a2a-45bc-a1b2-f66b94c231eb"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T22:10:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T22:46:34Z" name: default-dockercfg-5gbmz namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 42c549bb-7a2a-45bc-a1b2-f66b94c231eb resourceVersion: "25723" uid: 1cbb2160-1af5-487c-9dda-96af8ea82ac8 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T22:10:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"69efa3ba-78bd-4f65-b85d-d9f0b247ca6d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T22:10:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T22:46:37Z" name: deployer-dockercfg-sjssr namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 69efa3ba-78bd-4f65-b85d-d9f0b247ca6d resourceVersion: "25882" uid: 90c5f5e2-7ce3-4ea9-adee-0f33ce1b5062 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T22:16:07Z" service.beta.openshift.io/expiry: "2028-04-15T22:16:07Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 3c483ecf-3876-424c-b181-e7b79804984b creationTimestamp: "2026-04-16T22:16:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"3c483ecf-3876-424c-b181-e7b79804984b"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T22:16:07Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 3c483ecf-3876-424c-b181-e7b79804984b resourceVersion: "7795" uid: e1bd4144-f1f7-480d-a3bc-fb6a822f1e96 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-16T22:10:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a9fb5f30-9a3a-4425-be21-01b363bc710a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T22:10:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T22:46:34Z" name: dns-dockercfg-6fpb6 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: a9fb5f30-9a3a-4425-be21-01b363bc710a resourceVersion: "25682" uid: a6146119-4d94-4e3f-acd7-ccfa1da76119 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-16T22:10:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5354244f-38c1-48e3-8079-c35e965c56ea"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T22:10:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T22:46:34Z" name: node-resolver-dockercfg-k2vjm namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 5354244f-38c1-48e3-8079-c35e965c56ea resourceVersion: "25669" uid: 35342c5d-f748-49a6-bb40-b30bbe5d186c type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "42613"