--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-23T17:37:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"99360c01-27bc-4dff-8e63-8f7c7cf06245"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:37:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T18:13:37Z" name: builder-dockercfg-6tmwm namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 99360c01-27bc-4dff-8e63-8f7c7cf06245 resourceVersion: "21900" uid: 8d4f0a58-43ff-4e67-9c75-b30d005c1247 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-23T17:37:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"16d97892-bbe7-4cc7-8194-ff2d2ae104f7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:37:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T18:13:33Z" name: default-dockercfg-cjlnw namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 16d97892-bbe7-4cc7-8194-ff2d2ae104f7 resourceVersion: "21769" uid: 7e29d8f7-f651-4579-b414-53edfdf7574d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-23T17:37:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5fa7de9b-29f3-40f7-a6fa-ab0d0b41e2ad"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:37:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T18:13:37Z" name: deployer-dockercfg-55p59 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 5fa7de9b-29f3-40f7-a6fa-ab0d0b41e2ad resourceVersion: "21896" uid: f95799e2-6ee8-42c2-88c0-c2f5935efaef type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-22T17:43:22Z" service.beta.openshift.io/expiry: "2028-04-22T17:43:22Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 4ca4d6e4-39bc-4d84-91ad-2830c9734268 creationTimestamp: "2026-04-23T17:43:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"4ca4d6e4-39bc-4d84-91ad-2830c9734268"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-23T17:43:23Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 4ca4d6e4-39bc-4d84-91ad-2830c9734268 resourceVersion: "7662" uid: 546b0f86-e2c4-4ff7-ae93-714b4de32435 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-23T17:37:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ab3b9a53-701e-47a2-ae60-60120e9e2a2c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:37:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T18:13:33Z" name: dns-dockercfg-b6vkm namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: ab3b9a53-701e-47a2-ae60-60120e9e2a2c resourceVersion: "21746" uid: 106b6c6f-25b1-418c-ba48-61396b60419e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-23T17:37:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9e488ab2-1803-4898-9b4c-0844619dcd1a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:37:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T18:13:33Z" name: node-resolver-dockercfg-z64c7 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 9e488ab2-1803-4898-9b4c-0844619dcd1a resourceVersion: "21752" uid: 26560eae-cf2c-48ee-8f5f-9a45ceea8bdd type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "25771"