--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T14:50:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8c240ad0-284c-4ee3-a2a2-f4d3478f28b5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:50:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T15:26:32Z" name: builder-dockercfg-k6mf6 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 8c240ad0-284c-4ee3-a2a2-f4d3478f28b5 resourceVersion: "44312" uid: 8b20483d-2c69-4900-90d4-97e3d0db1589 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T14:50:26Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4cac2c34-909b-4a9e-8cbd-e6e39a00a09e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:50:26Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T15:26:27Z" name: default-dockercfg-z5zfg namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 4cac2c34-909b-4a9e-8cbd-e6e39a00a09e resourceVersion: "44094" uid: 083124ab-01a1-4f13-96f0-e1e0f1547ab8 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T14:50:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6daaf1b8-3860-4715-8645-4d350c07fa74"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:50:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T15:26:32Z" name: deployer-dockercfg-d2fnw namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 6daaf1b8-3860-4715-8645-4d350c07fa74 resourceVersion: "44305" uid: e15ab45f-ad63-464e-9387-f8573c661ee8 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T14:56:10Z" service.beta.openshift.io/expiry: "2028-04-19T14:56:10Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: ae5e5f8a-33aa-48f0-991d-2b8437622045 creationTimestamp: "2026-04-20T14:56:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"ae5e5f8a-33aa-48f0-991d-2b8437622045"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T14:56:10Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: ae5e5f8a-33aa-48f0-991d-2b8437622045 resourceVersion: "7724" uid: a0f877d7-2a6a-4c69-bf90-84c2683f23a4 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-20T14:50:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d695fc09-465c-4db3-95fc-0bf3b4859869"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:50:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T15:26:27Z" name: dns-dockercfg-rc7ph namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: d695fc09-465c-4db3-95fc-0bf3b4859869 resourceVersion: "44112" uid: f70d4bef-68b6-4a06-90e8-29416bfc8d82 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-20T14:50:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"75377485-9e6f-4818-b172-10deda1211b6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:50:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T15:26:27Z" name: node-resolver-dockercfg-nzkkj namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 75377485-9e6f-4818-b172-10deda1211b6 resourceVersion: "44090" uid: 07f7b0b6-a053-4b29-b06c-63e914481231 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "45912"