--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T14:22:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c75342a3-ac20-44af-9f4c-4291d8305223"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:22:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T14:59:16Z" name: builder-dockercfg-jwshb namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: c75342a3-ac20-44af-9f4c-4291d8305223 resourceVersion: "42827" uid: e30f6c60-1316-4f43-8f27-f5042f23e9ee type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T14:22:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5fb64693-6f78-4f54-86b7-39a53eae2f0d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:22:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T14:59:14Z" name: default-dockercfg-8p9qg namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 5fb64693-6f78-4f54-86b7-39a53eae2f0d resourceVersion: "42571" uid: a1a462b4-55f7-4db3-b00d-b78d1edcaccc type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T14:22:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"27012368-a0ac-4737-ba29-0bc93be4fbac"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:22:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T14:59:16Z" name: deployer-dockercfg-ph7r5 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 27012368-a0ac-4737-ba29-0bc93be4fbac resourceVersion: "42834" uid: 65d92819-ab2a-4c59-9cb8-8a6c92c5549a type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T14:28:35Z" service.beta.openshift.io/expiry: "2028-04-19T14:28:35Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 5acb147f-7bc9-418a-ad5c-21528be72cdf creationTimestamp: "2026-04-20T14:28:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"5acb147f-7bc9-418a-ad5c-21528be72cdf"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T14:28:36Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 5acb147f-7bc9-418a-ad5c-21528be72cdf resourceVersion: "7638" uid: c149d99c-8736-4de2-8376-486e960891c4 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-20T14:22:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"03262221-7c63-4e60-a8e0-3490849fc422"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:22:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T14:59:14Z" name: dns-dockercfg-5k2mg namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 03262221-7c63-4e60-a8e0-3490849fc422 resourceVersion: "42590" uid: 8547854b-fab2-4df3-8a0c-616119104e4b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-20T14:22:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"54e313e2-d660-4cbb-be06-04b4d0f97bf1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:22:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T14:59:14Z" name: node-resolver-dockercfg-qhcng namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 54e313e2-d660-4cbb-be06-04b4d0f97bf1 resourceVersion: "42596" uid: 4e5dde7c-8d3a-45da-99ce-8d72a9f4fd2a type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "47048"