--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-21T14:52:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3325abe6-7f12-473d-82ca-073905fec57c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:52:13Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T15:28:13Z" name: builder-dockercfg-rxv96 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 3325abe6-7f12-473d-82ca-073905fec57c resourceVersion: "38780" uid: 39a348f8-175d-4d8f-bee2-3cd81eed17ac type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-21T14:52:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"69a490f6-9b7d-4ee4-a979-aab587710128"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:52:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T15:28:09Z" name: default-dockercfg-rc5bc namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 69a490f6-9b7d-4ee4-a979-aab587710128 resourceVersion: "38656" uid: c42f6f8f-32ec-4a47-be49-90a197ff6043 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-21T14:52:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e9d55b88-e5b2-4f1c-a7be-51f96870231e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:52:13Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T15:28:13Z" name: deployer-dockercfg-8nstd namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: e9d55b88-e5b2-4f1c-a7be-51f96870231e resourceVersion: "38781" uid: b7ac182a-c9cd-4b4d-80a1-63590bfb852b type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T14:58:04Z" service.beta.openshift.io/expiry: "2028-04-20T14:58:04Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 3ebed1b3-ffa8-4ac9-91a1-d55142f3441b creationTimestamp: "2026-04-21T14:58:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"3ebed1b3-ffa8-4ac9-91a1-d55142f3441b"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T14:58:05Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 3ebed1b3-ffa8-4ac9-91a1-d55142f3441b resourceVersion: "7762" uid: 1a5301d6-3fcf-4091-9590-920ae10d66a5 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-21T14:52:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"89dabf5f-a6c8-4a1c-b804-ded86c28859a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:52:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T15:28:09Z" name: dns-dockercfg-5sqkw namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 89dabf5f-a6c8-4a1c-b804-ded86c28859a resourceVersion: "38639" uid: 7eefcb19-4a37-4e4b-89f2-8b223d239a7e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-21T14:52:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"93c1c995-7df3-43c7-a393-6e5f9036c852"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:52:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T15:28:09Z" name: node-resolver-dockercfg-shmt9 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 93c1c995-7df3-43c7-a393-6e5f9036c852 resourceVersion: "38643" uid: a792f855-b3ee-4ed9-8a08-404171a79f03 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "46611"