--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-19T15:20:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c3c13c31-8c47-484e-8963-ef146c92f1a3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-19T15:20:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-19T15:56:34Z" name: builder-dockercfg-vv8lg namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: c3c13c31-8c47-484e-8963-ef146c92f1a3 resourceVersion: "44468" uid: 6a474a37-9e1e-46db-917c-d45238a4415f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-19T15:20:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"408fb14e-b858-4428-8e9e-e0f32d67afd3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-19T15:20:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-19T15:56:29Z" name: default-dockercfg-nllmd namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 408fb14e-b858-4428-8e9e-e0f32d67afd3 resourceVersion: "44263" uid: e4ebd92d-3d06-4a61-8593-4a3d9678894e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-19T15:20:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1eaf2d94-c8af-4a06-b3f6-6c5cb53dcb37"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-19T15:20:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-19T15:56:34Z" name: deployer-dockercfg-glnm8 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 1eaf2d94-c8af-4a06-b3f6-6c5cb53dcb37 resourceVersion: "44480" uid: a2eece2e-c7d6-48ae-a7be-d3f570f6d8e4 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-18T15:26:04Z" service.beta.openshift.io/expiry: "2028-04-18T15:26:04Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 93b8709d-a5f7-45a0-9cca-3a20bb3985ad creationTimestamp: "2026-04-19T15:26:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"93b8709d-a5f7-45a0-9cca-3a20bb3985ad"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-19T15:26:05Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 93b8709d-a5f7-45a0-9cca-3a20bb3985ad resourceVersion: "7593" uid: bf49cbf9-8b54-434c-88bf-144732940a77 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-19T15:20:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"646159f3-2a79-4790-8880-314733938409"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-19T15:20:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-19T15:56:29Z" name: dns-dockercfg-dvb5z namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 646159f3-2a79-4790-8880-314733938409 resourceVersion: "44282" uid: 1ac72961-0cae-4009-94b7-cf167882eeeb type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-19T15:20:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a4ce82dc-ee00-4f04-8f0c-ffa8ebb9c141"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-19T15:20:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-19T15:56:29Z" name: node-resolver-dockercfg-x84qs namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: a4ce82dc-ee00-4f04-8f0c-ffa8ebb9c141 resourceVersion: "44283" uid: 1bb23167-6a28-4b58-9dcd-13221cc1fdfa type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "46465"