--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T21:12:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c38da9e6-0adb-44fb-8ae0-1491fc508347"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:12:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:48:14Z" name: builder-dockercfg-4b75n namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: c38da9e6-0adb-44fb-8ae0-1491fc508347 resourceVersion: "25382" uid: 48b9efec-c0fb-455c-94bf-687789ef86b8 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T21:12:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c517edc8-e58e-4d20-bf56-1924125cd258"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:12:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:48:09Z" name: default-dockercfg-rgp49 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: c517edc8-e58e-4d20-bf56-1924125cd258 resourceVersion: "25189" uid: d2951cc5-d8b4-4d7f-86d0-fc70eb1cf753 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T21:12:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1fbff13b-ad3a-435a-86c1-57acb9297013"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:12:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:48:14Z" name: deployer-dockercfg-5n555 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 1fbff13b-ad3a-435a-86c1-57acb9297013 resourceVersion: "25361" uid: cde3d4c9-5946-4fce-854e-fd78b1367e69 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T21:17:43Z" service.beta.openshift.io/expiry: "2028-04-23T21:17:43Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 81e468e1-5205-466c-9936-f886508e3ab9 creationTimestamp: "2026-04-24T21:17:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"81e468e1-5205-466c-9936-f886508e3ab9"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T21:17:43Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 81e468e1-5205-466c-9936-f886508e3ab9 resourceVersion: "7631" uid: e244aecc-e9bd-41f1-bf9b-cd316844e233 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-24T21:12:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1ee66ee7-8624-4ec9-9aa2-b7abd83615de"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:12:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:48:09Z" name: dns-dockercfg-txjjd namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 1ee66ee7-8624-4ec9-9aa2-b7abd83615de resourceVersion: "25195" uid: 516d2423-794c-4202-b00b-7dd80cc9d258 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-24T21:12:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4089f4a9-cdbe-43f1-b0d2-1129db17352b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:12:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:48:09Z" name: node-resolver-dockercfg-6ppx7 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 4089f4a9-cdbe-43f1-b0d2-1129db17352b resourceVersion: "25186" uid: eb1d05b9-dd70-4a45-9884-b82ff4b84c99 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "42095"