--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-21T02:36:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bf730c3c-d029-49a8-8575-76de2c3457a6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T02:36:51Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T02:37:22Z" name: builder-dockercfg-wc7nz namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: bf730c3c-d029-49a8-8575-76de2c3457a6 resourceVersion: "4245" uid: 789fb935-7238-4405-9ee6-a520409d034e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-21T02:36:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d372501c-b480-46ae-ac4e-c200187c9707"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T02:36:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T02:37:21Z" name: default-dockercfg-hx4cx namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: d372501c-b480-46ae-ac4e-c200187c9707 resourceVersion: "4090" uid: 1121ad10-72d0-46b1-a8f2-8a2501d9d8fa type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-21T02:36:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d0a60ca7-dcac-4988-a836-ab7cf6938e03"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T02:36:51Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T02:37:22Z" name: deployer-dockercfg-xgfv6 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: d0a60ca7-dcac-4988-a836-ab7cf6938e03 resourceVersion: "4244" uid: 4b4f9893-4e5f-4b12-ace0-e132e207efef type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T02:42:38Z" service.beta.openshift.io/expiry: "2028-04-20T02:42:38Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: c50f4bcb-a759-4be4-8da3-042c86766035 creationTimestamp: "2026-04-21T02:42:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"c50f4bcb-a759-4be4-8da3-042c86766035"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T02:42:39Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: c50f4bcb-a759-4be4-8da3-042c86766035 resourceVersion: "7617" uid: 679d69d4-2788-409c-a082-70fe0de6d617 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-21T02:36:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c1572aa2-5265-4c6d-a129-4aa402ca2742"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T02:36:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T02:37:21Z" name: dns-dockercfg-6wzzj namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: c1572aa2-5265-4c6d-a129-4aa402ca2742 resourceVersion: "4089" uid: 7d6839c2-f1fc-44ff-8c0e-6312ac58e914 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-21T02:36:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"aebe4381-9095-4c81-acb8-d8451e983a69"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T02:36:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T02:37:21Z" name: node-resolver-dockercfg-zcs4l namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: aebe4381-9095-4c81-acb8-d8451e983a69 resourceVersion: "4091" uid: f281e6d6-d4d6-493c-99fe-5dd16aaf9387 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "27501"