--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-21T00:00:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4bf6b47b-1eed-49c3-aac4-b642cd73a595"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T00:00:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T00:36:08Z" name: builder-dockercfg-hc2b2 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 4bf6b47b-1eed-49c3-aac4-b642cd73a595 resourceVersion: "45098" uid: 23c7ca85-cec5-4415-abcf-c1ee0013c2d6 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-21T00:00:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"539eba3c-b3d7-45ca-97ab-8bdbe2c9a45f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T00:00:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T00:36:03Z" name: default-dockercfg-mlnt2 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 539eba3c-b3d7-45ca-97ab-8bdbe2c9a45f resourceVersion: "44927" uid: 90ff7c62-bb93-4efc-a4ed-0879b10c372b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-21T00:00:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1ff2b489-46ef-4796-8cad-3c932e4cd01c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T00:00:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T00:36:08Z" name: deployer-dockercfg-29skd namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 1ff2b489-46ef-4796-8cad-3c932e4cd01c resourceVersion: "45119" uid: c1b54c42-a6ad-4823-9abb-0d1855b2f12a type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T00:03:57Z" service.beta.openshift.io/expiry: "2028-04-20T00:03:57Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: c82d790f-0fbf-4449-b9e0-29eea07a92a9 creationTimestamp: "2026-04-21T00:03:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"c82d790f-0fbf-4449-b9e0-29eea07a92a9"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T00:03:58Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: c82d790f-0fbf-4449-b9e0-29eea07a92a9 resourceVersion: "7312" uid: 57016b31-57a4-465c-9a36-121beafd35fa type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-21T00:00:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"75f70b74-4f8d-4bad-8f30-0584c5414d9d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T00:00:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T00:36:03Z" name: dns-dockercfg-79cql namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 75f70b74-4f8d-4bad-8f30-0584c5414d9d resourceVersion: "44911" uid: cef049e3-e636-4d09-bc0f-840246b51d52 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-21T00:00:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3ada25d9-d10d-4b2a-9052-e6766ab3e0a5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T00:00:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T00:36:03Z" name: node-resolver-dockercfg-qfhfx namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 3ada25d9-d10d-4b2a-9052-e6766ab3e0a5 resourceVersion: "44915" uid: 9f994d0a-1720-464c-adb3-d89d5d0b5c40 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "48124"