--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T21:12:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"95c08ca8-f09d-4cac-ad9f-91e87906f280"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:12:57Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:49:07Z" name: builder-dockercfg-cnxvm namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 95c08ca8-f09d-4cac-ad9f-91e87906f280 resourceVersion: "38753" uid: 4490a14b-323b-4f09-b830-175c739bfc8e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T21:12:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"54fac18b-b2d7-4a48-9133-0fd6afa61a68"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:12:55Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:49:06Z" name: default-dockercfg-9n5mp namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 54fac18b-b2d7-4a48-9133-0fd6afa61a68 resourceVersion: "38681" uid: d231fa1e-dd64-4505-8e99-fd33372483f9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T21:12:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b45c13a9-107a-48d8-959e-d4dc68d6a24f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:12:57Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:49:08Z" name: deployer-dockercfg-c8q48 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: b45c13a9-107a-48d8-959e-d4dc68d6a24f resourceVersion: "38872" uid: 2431d620-a0d6-4aab-b468-032e74398a53 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T21:16:56Z" service.beta.openshift.io/expiry: "2028-04-23T21:16:56Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: e93fc42e-d7b4-4cde-aec7-2d9003909584 creationTimestamp: "2026-04-24T21:16:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"e93fc42e-d7b4-4cde-aec7-2d9003909584"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T21:16:57Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: e93fc42e-d7b4-4cde-aec7-2d9003909584 resourceVersion: "6679" uid: 292677f8-71e0-4c5b-9e8c-5b7ee53fc71d type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-24T21:12:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4640daad-3209-498b-a35f-20b610920cbc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:12:55Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:49:06Z" name: dns-dockercfg-vh4z7 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 4640daad-3209-498b-a35f-20b610920cbc resourceVersion: "38694" uid: c5408ded-eab1-41c7-b503-364afbda8b93 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-24T21:12:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2a7601c0-bf48-41a8-bc2e-200a7a4ea32c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:12:55Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:49:06Z" name: node-resolver-dockercfg-9hfvp namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 2a7601c0-bf48-41a8-bc2e-200a7a4ea32c resourceVersion: "38662" uid: 59127c27-50a9-4930-b1b9-006c117ce977 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "48145"