--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T06:59:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"49782007-c236-4b6c-ab36-50c6ce6ee459"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T06:59:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T07:35:52Z" name: builder-dockercfg-2m5bm namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 49782007-c236-4b6c-ab36-50c6ce6ee459 resourceVersion: "38840" uid: 39a89331-b59a-49c3-ab09-c8598f2f4604 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T06:59:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e799bc05-38ec-432b-8ef2-fada16f611d4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T06:59:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T07:35:50Z" name: default-dockercfg-hh96h namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: e799bc05-38ec-432b-8ef2-fada16f611d4 resourceVersion: "38606" uid: 95d29f13-7cbd-43bf-afbf-b7522bd46d5a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T06:59:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1039bca2-93c9-4c22-8bb8-319238cec079"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T06:59:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T07:35:52Z" name: deployer-dockercfg-jckdm namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 1039bca2-93c9-4c22-8bb8-319238cec079 resourceVersion: "38815" uid: 5c44e55d-ae55-4aa8-8aad-7572981f3111 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T07:03:31Z" service.beta.openshift.io/expiry: "2028-04-19T07:03:31Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: da22220d-29e5-40af-a3c4-f790f6945943 creationTimestamp: "2026-04-20T07:03:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"da22220d-29e5-40af-a3c4-f790f6945943"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T07:03:31Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: da22220d-29e5-40af-a3c4-f790f6945943 resourceVersion: "7102" uid: 37edf33d-79db-4dec-a2d0-1d276428b8e6 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-20T06:59:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4d6021c4-2457-4778-905e-64440dbdb279"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T06:59:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T07:35:50Z" name: dns-dockercfg-vhcpq namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 4d6021c4-2457-4778-905e-64440dbdb279 resourceVersion: "38586" uid: 5a0db001-7029-46f2-8a5d-451ec32f963f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-20T06:59:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"46f1a3dc-1f01-4261-85e7-0b01f88ae8f8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T06:59:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T07:35:50Z" name: node-resolver-dockercfg-n8f2t namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 46f1a3dc-1f01-4261-85e7-0b01f88ae8f8 resourceVersion: "38616" uid: 1e7c0bd8-9d38-4c0b-ba4c-b15210eea7ee type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "43275"