--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T15:13:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"54ecc3e2-b920-44d6-a8b9-060da2ea1a0f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T15:13:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T15:13:55Z" name: builder-dockercfg-cl5g5 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 54ecc3e2-b920-44d6-a8b9-060da2ea1a0f resourceVersion: "3926" uid: a244ffed-eab1-4019-a589-a63e0ae903a4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T15:13:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9afb5913-0d12-4fe2-a2ba-95933721fd5e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T15:13:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T15:13:53Z" name: default-dockercfg-74rlq namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 9afb5913-0d12-4fe2-a2ba-95933721fd5e resourceVersion: "3792" uid: 275a3f41-3220-4df1-bd7c-dc416f254cbe type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T15:13:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"14771a79-6820-487a-9293-a9905c4fb1f9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T15:13:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T15:13:55Z" name: deployer-dockercfg-zr6d2 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 14771a79-6820-487a-9293-a9905c4fb1f9 resourceVersion: "3925" uid: 8b46704f-ccb0-4ffc-a152-4500b600dfc5 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T15:19:30Z" service.beta.openshift.io/expiry: "2028-04-16T15:19:30Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 0aed9dd9-cd3d-434b-8dac-8954670e56ee creationTimestamp: "2026-04-17T15:19:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"0aed9dd9-cd3d-434b-8dac-8954670e56ee"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T15:19:31Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 0aed9dd9-cd3d-434b-8dac-8954670e56ee resourceVersion: "7716" uid: 562107b0-1f5c-4dcd-8e05-9b013439eabe type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-17T15:13:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4dd16a1a-591e-43ea-933c-bfd9be588922"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T15:13:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T15:13:53Z" name: dns-dockercfg-p8skx namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 4dd16a1a-591e-43ea-933c-bfd9be588922 resourceVersion: "3789" uid: 0168f3bb-108d-4884-b643-36bbe29870b1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-17T15:13:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7feac3e9-f322-43cb-905c-41641a71b21e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T15:13:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T15:13:53Z" name: node-resolver-dockercfg-znk6p namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 7feac3e9-f322-43cb-905c-41641a71b21e resourceVersion: "3793" uid: e3f14212-7b2e-4d9a-b8e6-b5aa49d141e6 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "28000"