--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T16:28:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3b42f27f-36bb-483c-911c-d01d6f1844db"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:28:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:28:36Z" name: builder-dockercfg-zgttj namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 3b42f27f-36bb-483c-911c-d01d6f1844db resourceVersion: "3718" uid: 93e88541-fa58-4c1b-a193-e8c5d2d09632 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T16:28:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:28:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ae4d1018-4c3f-4619-918c-036942e9d78b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:28:30Z" name: default-dockercfg-8bn26 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: ae4d1018-4c3f-4619-918c-036942e9d78b resourceVersion: "3060" uid: 00814330-2086-4224-9382-546b4ea8aad1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T16:28:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cf9442dd-5503-47a3-98a7-ad906d4fc0f2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:28:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:28:36Z" name: deployer-dockercfg-7nvmj namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: cf9442dd-5503-47a3-98a7-ad906d4fc0f2 resourceVersion: "3712" uid: 64a2f34f-366d-495e-a1bc-8ff65f071e3c type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T16:32:10Z" service.beta.openshift.io/expiry: "2028-04-16T16:32:10Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 6df0d408-d608-4cbe-84b6-b1d519323468 creationTimestamp: "2026-04-17T16:32:11Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"6df0d408-d608-4cbe-84b6-b1d519323468"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T16:32:11Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 6df0d408-d608-4cbe-84b6-b1d519323468 resourceVersion: "7132" uid: 4c4c3166-5573-4f93-a00a-97631bd5be25 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-17T16:28:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f0354519-c329-4dcc-8de8-7e7ce00aeba6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:28:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:28:31Z" name: dns-dockercfg-xz9tf namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: f0354519-c329-4dcc-8de8-7e7ce00aeba6 resourceVersion: "3074" uid: 6ecfb835-2747-4fd9-a177-f12aad7692e1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-17T16:28:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"28fbeb73-50a5-46f5-b940-10b55a1600ff"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:28:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:28:31Z" name: node-resolver-dockercfg-25cmm namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 28fbeb73-50a5-46f5-b940-10b55a1600ff resourceVersion: "3075" uid: 7a73aeaf-be94-4604-b3ba-e48c68432b2e type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21019"