--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-05-11T20:47:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e7ed02e3-2c07-4669-96d5-1445e350f4b3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-05-11T20:47:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-05-11T21:23:08Z" name: builder-dockercfg-g7fjm namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: e7ed02e3-2c07-4669-96d5-1445e350f4b3 resourceVersion: "45294" uid: 2bc237fe-f1a7-4aac-8c37-3a636122144a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-05-11T20:47:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"725b1396-1eb4-4d8e-a14c-bb075feafd8c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-05-11T20:47:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-05-11T21:23:03Z" name: default-dockercfg-k4nrx namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 725b1396-1eb4-4d8e-a14c-bb075feafd8c resourceVersion: "45104" uid: 29e50a7e-fb50-469b-96b7-492faab307f9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-05-11T20:47:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9f296c6f-ef43-4014-94b6-e25d888c831f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-05-11T20:47:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-05-11T21:23:08Z" name: deployer-dockercfg-5gndv namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 9f296c6f-ef43-4014-94b6-e25d888c831f resourceVersion: "45297" uid: 58b5824f-61f9-4df1-a8fd-d7bc4c530170 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-05-10T20:51:09Z" service.beta.openshift.io/expiry: "2028-05-10T20:51:09Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 57790ffa-6e6c-4e2a-9ef8-6ce51d94bf47 creationTimestamp: "2026-05-11T20:51:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"57790ffa-6e6c-4e2a-9ef8-6ce51d94bf47"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-05-11T20:51:10Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 57790ffa-6e6c-4e2a-9ef8-6ce51d94bf47 resourceVersion: "7128" uid: d5fd7da8-28f5-4c42-8abd-50f1d77706ce type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-05-11T20:47:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0f3a7da6-c1c0-4f93-ae10-21da5a2375ec"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-05-11T20:47:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-05-11T21:23:03Z" name: dns-dockercfg-wsq67 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 0f3a7da6-c1c0-4f93-ae10-21da5a2375ec resourceVersion: "45111" uid: 5f0b5db7-67e1-48e1-a55b-607396369c05 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-05-11T20:47:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"21b73182-b0e1-4991-8778-5ce3a1b3eb77"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-05-11T20:47:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-05-11T21:23:03Z" name: node-resolver-dockercfg-qvmvl namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 21b73182-b0e1-4991-8778-5ce3a1b3eb77 resourceVersion: "45088" uid: d0faa983-c41f-443d-a595-03d94543e5d9 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "46229"