--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T18:39:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f8b42898-e0d4-4cf8-ab53-b25499e470a3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:39:05Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:15:05Z" name: builder-dockercfg-lkbbg namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: f8b42898-e0d4-4cf8-ab53-b25499e470a3 resourceVersion: "40975" uid: f8ee64aa-2eac-4f8b-b227-60cf4b05678e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T18:39:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"862f2caa-60a8-4e31-9920-1d387ce2a5a3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:39:00Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:15:01Z" name: default-dockercfg-xx9sl namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 862f2caa-60a8-4e31-9920-1d387ce2a5a3 resourceVersion: "40803" uid: 7414ff52-1da7-4145-8a46-2ff04cc844cb type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T18:39:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1b15be46-5096-43d5-ba56-0a6c9383dfe4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:39:05Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:15:05Z" name: deployer-dockercfg-jc6w9 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 1b15be46-5096-43d5-ba56-0a6c9383dfe4 resourceVersion: "40965" uid: fe914420-1bf4-4345-ad75-1f735fb8ec22 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T18:45:03Z" service.beta.openshift.io/expiry: "2028-04-21T18:45:03Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 7ebc8987-3a48-4dec-b625-4c9d87e862c2 creationTimestamp: "2026-04-22T18:45:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"7ebc8987-3a48-4dec-b625-4c9d87e862c2"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T18:45:04Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 7ebc8987-3a48-4dec-b625-4c9d87e862c2 resourceVersion: "7853" uid: 02af3bab-04ce-4e11-8d13-443c128934bc type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-22T18:39:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"795b8368-8ede-476d-af08-63cba7b364b6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:39:00Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:15:01Z" name: dns-dockercfg-5kx7g namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 795b8368-8ede-476d-af08-63cba7b364b6 resourceVersion: "40796" uid: 3fdeede2-0a90-463a-846b-4f34e0d986d9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-22T18:39:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"06b7a0d4-fbd6-4f13-ade9-dfdfd05c3997"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:39:00Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:15:01Z" name: node-resolver-dockercfg-hztd2 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 06b7a0d4-fbd6-4f13-ade9-dfdfd05c3997 resourceVersion: "40806" uid: cdcb8a5b-32f0-433e-93c2-cc60f4d5fc5f type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "46649"