--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T17:58:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4ba2bf58-7447-483b-a976-0e47061961c7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:58:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:34:53Z" name: builder-dockercfg-zp47x namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 4ba2bf58-7447-483b-a976-0e47061961c7 resourceVersion: "24555" uid: f00c8925-b2cd-49b8-8050-efe8709757b2 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T17:58:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"14d39ce1-b7f9-4364-bbd6-08cb797e6a11"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:58:45Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:34:51Z" name: default-dockercfg-pdxvl namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 14d39ce1-b7f9-4364-bbd6-08cb797e6a11 resourceVersion: "24422" uid: 178c46d3-1e49-48af-a6d6-5c056751ab51 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T17:58:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2bb5da7a-9804-45ca-bd0a-74a8a385623f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:58:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:34:53Z" name: deployer-dockercfg-zmzgl namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 2bb5da7a-9804-45ca-bd0a-74a8a385623f resourceVersion: "24565" uid: 02b37bab-30ec-409f-baa9-9f4d854fa4fe type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T18:04:52Z" service.beta.openshift.io/expiry: "2028-04-15T18:04:52Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 32e87e68-3e68-49cf-9dbe-5ce744b7f9d4 creationTimestamp: "2026-04-16T18:04:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"32e87e68-3e68-49cf-9dbe-5ce744b7f9d4"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T18:04:53Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 32e87e68-3e68-49cf-9dbe-5ce744b7f9d4 resourceVersion: "7798" uid: a19ce22c-4161-49c1-a35a-59846d927d6e type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-16T17:58:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5595cce8-967b-4d1a-a340-7c59a7e52b37"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:58:45Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:34:51Z" name: dns-dockercfg-j5p9z namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 5595cce8-967b-4d1a-a340-7c59a7e52b37 resourceVersion: "24440" uid: e5d11858-925b-403d-a3f1-b4d98ca69aff type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-16T17:58:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"dc4070c2-efb6-494a-901c-c8a72057c939"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:58:45Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:34:51Z" name: node-resolver-dockercfg-nqx78 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: dc4070c2-efb6-494a-901c-c8a72057c939 resourceVersion: "24424" uid: 4639b877-9ae6-46f0-976f-37bd8e11b8e7 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "34201"