--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T17:58:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"47ca17d4-9820-48f5-9ec6-099a8fd52c90"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:58:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T17:58:37Z" name: builder-dockercfg-97whm namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 47ca17d4-9820-48f5-9ec6-099a8fd52c90 resourceVersion: "3980" uid: 9b4b2507-4baa-4adc-b59a-8c12f06aacbc type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T17:58:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"80a92d11-7c94-4a73-84fc-a522ec9a3ffd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:58:12Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T17:58:35Z" name: default-dockercfg-fvhk5 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 80a92d11-7c94-4a73-84fc-a522ec9a3ffd resourceVersion: "3808" uid: 1cd8b96b-2984-4cd6-98df-b65dca55739b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T17:58:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3b74dab5-9414-495f-a374-1adf6066d55c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:58:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T17:58:37Z" name: deployer-dockercfg-j9wsc namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 3b74dab5-9414-495f-a374-1adf6066d55c resourceVersion: "3979" uid: 4a31f410-e803-4c30-9aeb-fc08ca967b67 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T18:04:33Z" service.beta.openshift.io/expiry: "2028-04-15T18:04:33Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 7f543361-f192-459f-ad1a-b32e89b4dc17 creationTimestamp: "2026-04-16T18:04:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"7f543361-f192-459f-ad1a-b32e89b4dc17"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T18:04:34Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 7f543361-f192-459f-ad1a-b32e89b4dc17 resourceVersion: "7896" uid: 7024470d-bb93-4af4-86c7-5c2c50933cb1 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-16T17:58:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4ff08a02-06f6-44ed-84b5-96f3a204fc46"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:58:12Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T17:58:35Z" name: dns-dockercfg-lh6dc namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 4ff08a02-06f6-44ed-84b5-96f3a204fc46 resourceVersion: "3814" uid: 97437531-80d7-4679-9b61-7c0946128f54 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-16T17:58:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e1ced97f-e1fe-4d23-85ac-92d380f6c76a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:58:12Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T17:58:35Z" name: node-resolver-dockercfg-rtd5c namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: e1ced97f-e1fe-4d23-85ac-92d380f6c76a resourceVersion: "3815" uid: 4fb9bd2c-0fca-41e6-ae14-af53523e4ba7 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "20789"