--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T14:20:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"23ccf391-4dd6-4bdb-9a51-bca34bece3bd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:58Z" name: builder-dockercfg-zvcpq namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 23ccf391-4dd6-4bdb-9a51-bca34bece3bd resourceVersion: "26203" uid: 5dd290f9-9090-41d2-8be2-008a2662a0a6 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T14:20:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"92ac8299-b30b-47d2-ad11-cf3387b4d43e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:56Z" name: default-dockercfg-nk46g namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 92ac8299-b30b-47d2-ad11-cf3387b4d43e resourceVersion: "25970" uid: 65ee21f7-c141-4ac1-86fc-30ca265d3e1e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T14:20:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d65deeeb-64e6-4470-942c-b95510b715b7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:58Z" name: deployer-dockercfg-g6nm8 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: d65deeeb-64e6-4470-942c-b95510b715b7 resourceVersion: "26209" uid: 823797a8-9e12-4522-8f0c-2e2736fdfe92 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T14:26:00Z" service.beta.openshift.io/expiry: "2028-04-23T14:26:00Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: e761bd15-c692-4618-a5c7-ec50d5abe52a creationTimestamp: "2026-04-24T14:26:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"e761bd15-c692-4618-a5c7-ec50d5abe52a"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T14:26:01Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: e761bd15-c692-4618-a5c7-ec50d5abe52a resourceVersion: "7623" uid: 20c2b824-0965-4a16-b504-89033a9b0fa6 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-24T14:20:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d95fd526-cedf-44ea-bbf3-c0b666995f2d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:56Z" name: dns-dockercfg-m8ml5 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: d95fd526-cedf-44ea-bbf3-c0b666995f2d resourceVersion: "26087" uid: 15a58b91-c697-4774-92db-80e89d75a787 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-24T14:20:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"faafe13a-be7d-45f7-9227-e31f9bfdf202"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:56Z" name: node-resolver-dockercfg-hr775 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: faafe13a-be7d-45f7-9227-e31f9bfdf202 resourceVersion: "26021" uid: 5f334c0f-737f-43b8-915c-ba3d3b170101 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "33168"