--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T18:17:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"641cd7a1-ffa4-464a-a9b8-0b789707250f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:17:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:17:31Z" name: builder-dockercfg-2slr9 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 641cd7a1-ffa4-464a-a9b8-0b789707250f resourceVersion: "3945" uid: 98e0e96e-ded2-49a8-9396-45218e49af74 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T18:17:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d0489184-ba47-41af-92de-c6a163029f69"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:17:00Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:17:29Z" name: default-dockercfg-mhng9 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: d0489184-ba47-41af-92de-c6a163029f69 resourceVersion: "3774" uid: 942b77d7-2cae-4851-8ff7-0b4e10fda8e1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T18:17:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b69a9a27-9704-484d-9fe5-0f7a912d18d4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:17:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:17:31Z" name: deployer-dockercfg-8nn7r namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: b69a9a27-9704-484d-9fe5-0f7a912d18d4 resourceVersion: "3944" uid: 43385dc0-6400-449f-8bf1-ff402887c981 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T18:21:18Z" service.beta.openshift.io/expiry: "2028-04-21T18:21:18Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 98d9f3a1-724d-4acf-a7e7-7d8795675dc9 creationTimestamp: "2026-04-22T18:21:19Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"98d9f3a1-724d-4acf-a7e7-7d8795675dc9"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T18:21:19Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 98d9f3a1-724d-4acf-a7e7-7d8795675dc9 resourceVersion: "7217" uid: 6e605398-9278-451d-b15f-d6c2c72013c2 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-22T18:17:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bed3abdd-b29a-464b-b387-3be82c714988"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:17:00Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:17:29Z" name: dns-dockercfg-69x95 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: bed3abdd-b29a-464b-b387-3be82c714988 resourceVersion: "3773" uid: cdd3a37a-0cd3-41b8-9ae0-4ea538ac85a2 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-22T18:17:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9eef9e5e-5784-4f22-8ae6-409bac633143"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:17:00Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:17:29Z" name: node-resolver-dockercfg-q64zh namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 9eef9e5e-5784-4f22-8ae6-409bac633143 resourceVersion: "3775" uid: 0eb3ffcb-8bcd-477b-ac5a-baf6b5c50419 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "10947"