--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T14:11:11Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"dd22b244-534b-44f0-b307-2d885d8f57e5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:11:11Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:11:48Z" name: builder-dockercfg-kd2g4 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: dd22b244-534b-44f0-b307-2d885d8f57e5 resourceVersion: "4145" uid: 4cc7e878-ea4c-4f1c-80f8-e8c1d9024577 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T14:11:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5583afc6-c000-4fe6-8808-c5fa6e459223"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:11:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:11:47Z" name: default-dockercfg-wfq64 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 5583afc6-c000-4fe6-8808-c5fa6e459223 resourceVersion: "4019" uid: 5c1084c4-94e8-489a-a7e6-6c752a66d704 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T14:11:11Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"18805c62-b3ab-4883-86ad-8d48171ffb5d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:11:11Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:11:48Z" name: deployer-dockercfg-czpmz namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 18805c62-b3ab-4883-86ad-8d48171ffb5d resourceVersion: "4144" uid: 943591ec-fa96-4a0f-84aa-ed7872b6ea58 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T14:17:29Z" service.beta.openshift.io/expiry: "2028-04-21T14:17:29Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 9b52569a-2b00-4889-a64a-2a721fcd08d5 creationTimestamp: "2026-04-22T14:17:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"9b52569a-2b00-4889-a64a-2a721fcd08d5"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T14:17:30Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 9b52569a-2b00-4889-a64a-2a721fcd08d5 resourceVersion: "7894" uid: e2e6cd3c-977b-47ac-b8cd-a71db270a150 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-22T14:11:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9890761c-ad74-46ab-9a6e-be0759ce887a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:11:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:11:47Z" name: dns-dockercfg-hhqr7 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 9890761c-ad74-46ab-9a6e-be0759ce887a resourceVersion: "4023" uid: 18e8353b-4b93-4d6e-83a5-cf66f0f2cba5 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-22T14:11:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fbdce257-4b79-4840-9d2e-e6d572e7b570"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:11:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:11:47Z" name: node-resolver-dockercfg-n4pfj namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: fbdce257-4b79-4840-9d2e-e6d572e7b570 resourceVersion: "4026" uid: b98c4017-4472-4b0a-b7fc-a47161e78839 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "38799"