--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T21:24:24Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"72779253-2fd3-4a6f-9283-022bd9ccd353"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:24:24Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T22:00:25Z" name: builder-dockercfg-cj44t namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 72779253-2fd3-4a6f-9283-022bd9ccd353 resourceVersion: "25976" uid: a2453311-17b2-407d-a451-695f70fee964 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T21:24:19Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"783c5624-5b7b-4ca6-9cf0-dfeaf1f10f2f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:24:19Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T22:00:19Z" name: default-dockercfg-6klgj namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 783c5624-5b7b-4ca6-9cf0-dfeaf1f10f2f resourceVersion: "25785" uid: d159d4fe-6c5c-428b-a9f0-3d3ecf77f8cd type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T21:24:24Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ad6663e4-a30b-4a20-b3c2-859f9e3cdff3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:24:24Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T22:00:25Z" name: deployer-dockercfg-54q59 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: ad6663e4-a30b-4a20-b3c2-859f9e3cdff3 resourceVersion: "25991" uid: bb7d7557-9715-4d9a-b942-ec74bc952468 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T21:29:56Z" service.beta.openshift.io/expiry: "2028-04-23T21:29:56Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 2ee4c4ff-3fcb-4200-bb8c-e8750459554c creationTimestamp: "2026-04-24T21:29:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"2ee4c4ff-3fcb-4200-bb8c-e8750459554c"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T21:29:57Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 2ee4c4ff-3fcb-4200-bb8c-e8750459554c resourceVersion: "7768" uid: 4deb3e0c-a73f-4fc3-aab4-8e43b76f0bb2 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-24T21:24:19Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"39ae39f6-9b87-495f-b023-dc0833ac230e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:24:19Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T22:00:19Z" name: dns-dockercfg-5mvz7 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 39ae39f6-9b87-495f-b023-dc0833ac230e resourceVersion: "25751" uid: fd30680b-2a65-4ca0-8f27-dedd945c0741 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-24T21:24:19Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c5cfdf2b-b843-4e23-9c37-3573f74146c3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:24:19Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T22:00:19Z" name: node-resolver-dockercfg-285zj namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: c5cfdf2b-b843-4e23-9c37-3573f74146c3 resourceVersion: "25801" uid: 9606b0f9-6c1b-4337-b44e-1f7a11f8b44b type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "41898"