--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T23:09:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c19b6aed-d749-47d3-9ffc-172e72b1cc7e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T23:09:06Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T23:09:47Z" name: builder-dockercfg-h7t8r namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: c19b6aed-d749-47d3-9ffc-172e72b1cc7e resourceVersion: "4344" uid: ddea61ba-f936-47bc-a590-713a16c8d4b9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T23:09:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"499e2371-279d-4974-a192-e7f1915fde6d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T23:09:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T23:09:45Z" name: default-dockercfg-5dsvl namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 499e2371-279d-4974-a192-e7f1915fde6d resourceVersion: "4182" uid: 1ad95aec-de7b-487b-b174-ac3b6a51da2a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T23:09:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bf094e18-1d4c-44b8-ad3a-5cbb9c5e4897"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T23:09:06Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T23:09:47Z" name: deployer-dockercfg-rwhp5 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: bf094e18-1d4c-44b8-ad3a-5cbb9c5e4897 resourceVersion: "4343" uid: 0632b920-2623-4125-8d0d-2d4deabaa6c5 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T23:12:50Z" service.beta.openshift.io/expiry: "2028-04-19T23:12:50Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 2d466990-627d-4ed4-9e10-95df0bf088de creationTimestamp: "2026-04-20T23:12:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"2d466990-627d-4ed4-9e10-95df0bf088de"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T23:12:51Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 2d466990-627d-4ed4-9e10-95df0bf088de resourceVersion: "6281" uid: 8951458f-4969-48f5-9447-4290117d909f type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-20T23:09:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"185388d7-1c58-4b7d-ac97-e64231c9b224"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T23:09:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T23:09:45Z" name: dns-dockercfg-2fmt6 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 185388d7-1c58-4b7d-ac97-e64231c9b224 resourceVersion: "4186" uid: a3f833b9-e821-49d3-8cf4-413e4a2eb1be type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-20T23:09:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ee9d937d-e177-4997-a309-3b6f7e2b04b9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T23:09:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T23:09:45Z" name: node-resolver-dockercfg-4f2gz namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: ee9d937d-e177-4997-a309-3b6f7e2b04b9 resourceVersion: "4183" uid: ba07e8e9-8c7f-4d8b-b9f1-b15274cc0406 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "30245"