--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T19:54:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e1ad9f77-8128-4d67-b6ee-6a4f5a2bf768"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:54:41Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T20:30:41Z" name: builder-dockercfg-svs6l namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: e1ad9f77-8128-4d67-b6ee-6a4f5a2bf768 resourceVersion: "25982" uid: 919f07e0-f7d3-4249-b1dc-ad921cd9487b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T19:54:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"003b8f76-306c-4060-aa10-a2bd3e5f1ac3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:54:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T20:30:36Z" name: default-dockercfg-9cpss namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 003b8f76-306c-4060-aa10-a2bd3e5f1ac3 resourceVersion: "25666" uid: 1cc0a91a-3dd0-4719-9d41-f8f645cd7977 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T19:54:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c0070a56-1b3d-40b8-8de2-a573ca5451ad"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:54:41Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T20:30:41Z" name: deployer-dockercfg-cb796 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: c0070a56-1b3d-40b8-8de2-a573ca5451ad resourceVersion: "25968" uid: 99befcc7-6d9f-4eb0-974b-0a38e19a4fca type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T20:00:13Z" service.beta.openshift.io/expiry: "2028-04-21T20:00:13Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 75b24909-e58d-40ec-9e17-fd47d3490276 creationTimestamp: "2026-04-22T20:00:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"75b24909-e58d-40ec-9e17-fd47d3490276"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T20:00:14Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 75b24909-e58d-40ec-9e17-fd47d3490276 resourceVersion: "7496" uid: bd992e29-8ae5-416e-8b9e-56acca1d42ee type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-22T19:54:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a2eee446-7f4e-40e6-ae0b-4f112e1948dc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:54:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T20:30:36Z" name: dns-dockercfg-tzbrr namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: a2eee446-7f4e-40e6-ae0b-4f112e1948dc resourceVersion: "25684" uid: 6d6036c1-4aa4-4a37-aea6-7ba9cd7f6e49 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-22T19:54:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b3bf6b19-fb6f-4c6a-89bc-dea790e2f526"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:54:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T20:30:36Z" name: node-resolver-dockercfg-7782d namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: b3bf6b19-fb6f-4c6a-89bc-dea790e2f526 resourceVersion: "25670" uid: 8253eee8-dc01-483b-a8a4-157cf33099bc type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "33630"