--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-23T13:29:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"67978930-2806-4371-ae9c-0191718df7de"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T13:29:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T14:05:07Z" name: builder-dockercfg-6fnw7 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 67978930-2806-4371-ae9c-0191718df7de resourceVersion: "26187" uid: 7b0d4714-8c15-4211-8588-823c3d5d03c8 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-23T13:29:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fdc7e208-2c73-45d0-9abf-8f2a288a4071"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T13:29:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T14:05:02Z" name: default-dockercfg-qwwxb namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: fdc7e208-2c73-45d0-9abf-8f2a288a4071 resourceVersion: "26016" uid: 527630e3-1f0c-41e5-bfa3-56443403c836 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-23T13:29:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bd133a3a-3134-4989-adc8-577d49564507"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T13:29:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T14:05:07Z" name: deployer-dockercfg-bg4nw namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: bd133a3a-3134-4989-adc8-577d49564507 resourceVersion: "26185" uid: fa118ff3-2e53-4389-8eb0-ea9d0d13af7c type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-22T13:34:18Z" service.beta.openshift.io/expiry: "2028-04-22T13:34:18Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 2e0ffde2-aa72-4e8e-b931-79d221fe6b55 creationTimestamp: "2026-04-23T13:34:19Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"2e0ffde2-aa72-4e8e-b931-79d221fe6b55"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-23T13:34:19Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 2e0ffde2-aa72-4e8e-b931-79d221fe6b55 resourceVersion: "7653" uid: 5dc03e0d-22e9-44dd-9309-6c7a666512f0 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-23T13:29:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"73f0b8b3-39ef-48ec-9a06-3612bc39061b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T13:29:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T14:05:02Z" name: dns-dockercfg-svh2p namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 73f0b8b3-39ef-48ec-9a06-3612bc39061b resourceVersion: "26033" uid: a7e47f48-37e4-416d-8e18-d6079830c837 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-23T13:29:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a06cde70-d111-4188-b3c5-1557523c29ae"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T13:29:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T14:05:02Z" name: node-resolver-dockercfg-wk8bw namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: a06cde70-d111-4188-b3c5-1557523c29ae resourceVersion: "26026" uid: 4a5ef03f-9aa6-4f45-be83-2baeb47702e4 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "33487"