--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T18:45:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ebff95da-7c2c-4853-be0c-5fbd5c8d43c6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T18:45:06Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T19:21:06Z" name: builder-dockercfg-fjht9 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: ebff95da-7c2c-4853-be0c-5fbd5c8d43c6 resourceVersion: "43516" uid: e17b1df9-1138-46e0-b0da-f59f0846175b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T18:45:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f8082d8c-1d85-42d3-ba69-2223e6b710c2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T18:45:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T19:21:01Z" name: default-dockercfg-9r6dl namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: f8082d8c-1d85-42d3-ba69-2223e6b710c2 resourceVersion: "43307" uid: f32d3b59-3c79-4e5b-a8b8-1351ba5656a0 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T18:45:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"63742d48-346a-4889-89d2-23b5e06640f7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T18:45:06Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T19:21:06Z" name: deployer-dockercfg-4dv8j namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 63742d48-346a-4889-89d2-23b5e06640f7 resourceVersion: "43522" uid: eb4ad4be-f938-422d-8978-596cbbce3117 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T18:50:51Z" service.beta.openshift.io/expiry: "2028-04-16T18:50:51Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: c0059de4-06a1-44db-853c-c6761ea073de creationTimestamp: "2026-04-17T18:50:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"c0059de4-06a1-44db-853c-c6761ea073de"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T18:50:51Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: c0059de4-06a1-44db-853c-c6761ea073de resourceVersion: "7649" uid: 8998236e-8333-4223-aaf7-e19be2d62d09 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-17T18:45:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2a36614d-f443-41c8-a551-4269283bc3f2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T18:45:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T19:21:01Z" name: dns-dockercfg-ctvd8 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 2a36614d-f443-41c8-a551-4269283bc3f2 resourceVersion: "43293" uid: c495bd7b-9ad3-4ced-ab76-576408325866 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-17T18:45:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"abd23ef7-3497-4317-a954-3e99323aa386"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T18:45:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T19:21:01Z" name: node-resolver-dockercfg-xlxz2 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: abd23ef7-3497-4317-a954-3e99323aa386 resourceVersion: "43301" uid: 144f3f3c-5765-4abf-a1fa-2fab6dd78d32 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "46618"