--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T19:54:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"47366ea8-2f8c-4b04-8580-5b454fd4ae7d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:54:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T20:30:34Z" name: builder-dockercfg-8dcmq namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 47366ea8-2f8c-4b04-8580-5b454fd4ae7d resourceVersion: "25707" uid: 76d85012-2ed1-4ac4-9e72-98626b1b0138 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T19:54:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"140ac4a7-cfca-4435-91d3-354b008ddb80"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:54:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T20:30:29Z" name: default-dockercfg-n8hgs namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 140ac4a7-cfca-4435-91d3-354b008ddb80 resourceVersion: "25543" uid: c7640633-5048-491f-8f5d-7a6becca1598 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T19:54:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"930326fe-8841-420a-8f8f-65a37cb9983b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:54:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T20:30:34Z" name: deployer-dockercfg-d27cl namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 930326fe-8841-420a-8f8f-65a37cb9983b resourceVersion: "25708" uid: d973fcaf-7051-4279-a006-46aae2ad9dbf type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T19:59:53Z" service.beta.openshift.io/expiry: "2028-04-21T19:59:53Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 7d75af12-bed4-4182-a41f-1c95fbcf6a76 creationTimestamp: "2026-04-22T19:59:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"7d75af12-bed4-4182-a41f-1c95fbcf6a76"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T19:59:53Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 7d75af12-bed4-4182-a41f-1c95fbcf6a76 resourceVersion: "7715" uid: 5d37f5a1-9451-410c-8f25-af65294549ee type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-22T19:54:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5a41aef4-2c10-4b37-b0dd-572b1def3f4b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:54:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T20:30:29Z" name: dns-dockercfg-2xtr6 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 5a41aef4-2c10-4b37-b0dd-572b1def3f4b resourceVersion: "25551" uid: 4d259083-ea85-4f0d-b720-0308e2614c4b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-22T19:54:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c34aa44f-0e23-40e4-afd8-037c3fe573e8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:54:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T20:30:29Z" name: node-resolver-dockercfg-cktzz namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: c34aa44f-0e23-40e4-afd8-037c3fe573e8 resourceVersion: "25535" uid: d1f2c5ce-2674-4a8f-ad85-de85b3a15939 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "40784"