--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T15:57:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3cdf7181-79f0-436d-88a9-b13580693a07"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T15:57:52Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T16:33:53Z" name: builder-dockercfg-vdsrk namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 3cdf7181-79f0-436d-88a9-b13580693a07 resourceVersion: "35557" uid: 1a714c4b-ab75-4756-916d-c357b3c6255a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T15:57:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d6ce300f-41ea-4e4a-96d9-14a6991ef776"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T15:57:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T16:33:48Z" name: default-dockercfg-vgjjz namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: d6ce300f-41ea-4e4a-96d9-14a6991ef776 resourceVersion: "35381" uid: 44efb376-0ad4-4240-a8ef-92e096246a92 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T15:57:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4e4c8c03-b5ae-4b56-9723-d4ced3d6afc1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T15:57:52Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T16:33:53Z" name: deployer-dockercfg-gxhvf namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 4e4c8c03-b5ae-4b56-9723-d4ced3d6afc1 resourceVersion: "35561" uid: dbf3bd9f-6291-4326-9e5a-942ef6d811d9 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T16:01:40Z" service.beta.openshift.io/expiry: "2028-04-15T16:01:40Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 772e0e18-944a-48b8-a0d1-9833a60c9add creationTimestamp: "2026-04-16T16:01:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"772e0e18-944a-48b8-a0d1-9833a60c9add"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T16:01:40Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 772e0e18-944a-48b8-a0d1-9833a60c9add resourceVersion: "6681" uid: 2910cf24-ffec-4725-97ba-215db17293d7 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-16T15:57:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b3b1966c-31ed-45ee-baa3-9db2eea3ad52"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T15:57:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T16:33:48Z" name: dns-dockercfg-jr2th namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: b3b1966c-31ed-45ee-baa3-9db2eea3ad52 resourceVersion: "35377" uid: 95bd77ea-2a0d-4298-aff9-1790fa5ddc77 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-16T15:57:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a49bc210-d09b-4949-b13c-ac9e815f77a2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T15:57:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T16:33:48Z" name: node-resolver-dockercfg-sxb74 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: a49bc210-d09b-4949-b13c-ac9e815f77a2 resourceVersion: "35396" uid: 823f016b-4f47-4ae3-bbe6-810418d539cd type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "38427"