--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T13:08:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8c7c02f2-2860-4849-acf0-5a14f7a42c97"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:08:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:44:07Z" name: builder-dockercfg-c7b4r namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 8c7c02f2-2860-4849-acf0-5a14f7a42c97 resourceVersion: "44193" uid: f2715508-3cbb-400d-a938-8061d9a34737 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T13:08:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c7a44e66-568d-4875-8b5b-8d18e2fa2851"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:08:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:44:02Z" name: default-dockercfg-dqcds namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: c7a44e66-568d-4875-8b5b-8d18e2fa2851 resourceVersion: "43999" uid: 0d0f9d00-d574-410b-85c5-5ff14e992c96 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T13:08:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"906ac26e-276c-4302-9710-4c02ab2eb43b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:08:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:44:07Z" name: deployer-dockercfg-jnnn5 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 906ac26e-276c-4302-9710-4c02ab2eb43b resourceVersion: "44191" uid: 6535e259-3ffa-46c8-b52a-25bff84b3fe6 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T13:14:00Z" service.beta.openshift.io/expiry: "2028-04-15T13:14:00Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: c20f2cad-7685-4f6f-84fb-75df28275f95 creationTimestamp: "2026-04-16T13:14:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"c20f2cad-7685-4f6f-84fb-75df28275f95"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T13:14:01Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: c20f2cad-7685-4f6f-84fb-75df28275f95 resourceVersion: "7835" uid: a12d6480-d649-4993-90f6-0c42a162f88f type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-16T13:08:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8e6971b8-f743-46a4-915a-c26d839dbdd0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:08:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:44:02Z" name: dns-dockercfg-xkkx5 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 8e6971b8-f743-46a4-915a-c26d839dbdd0 resourceVersion: "44002" uid: 9868ee72-7550-4047-b404-9a62ec40432a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-16T13:08:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c69a1237-c0d2-4384-8a5e-7a3ea91f102a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:08:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:44:02Z" name: node-resolver-dockercfg-pn8p4 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: c69a1237-c0d2-4384-8a5e-7a3ea91f102a resourceVersion: "44013" uid: be420e03-ebed-4cf0-97dc-db9c7a0b6a0b type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "44724"