--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T08:29:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0e41cc4c-ff97-4a8c-8d36-005574fec7db"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T08:29:51Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T09:05:56Z" name: builder-dockercfg-2fdn4 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 0e41cc4c-ff97-4a8c-8d36-005574fec7db resourceVersion: "16251" uid: e3a6bd3a-05bd-4b81-9389-1e0fc14094a5 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T08:29:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"19a7504b-befd-4c46-8c9a-7783c4a63d8d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T08:29:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T09:05:52Z" name: default-dockercfg-gnvfx namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 19a7504b-befd-4c46-8c9a-7783c4a63d8d resourceVersion: "16114" uid: 9599323a-954a-4396-a54a-47de62ecdc93 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T08:29:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8e9bc282-b32c-4629-97b4-871e735bb792"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T08:29:51Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T09:05:56Z" name: deployer-dockercfg-wjf7r namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 8e9bc282-b32c-4629-97b4-871e735bb792 resourceVersion: "16253" uid: 56c6636c-43d9-4252-be88-6142c8eb2715 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T08:35:28Z" service.beta.openshift.io/expiry: "2028-04-15T08:35:28Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 2b155609-a45b-4877-89ec-86db57ef9e4a creationTimestamp: "2026-04-16T08:35:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"2b155609-a45b-4877-89ec-86db57ef9e4a"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T08:35:29Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 2b155609-a45b-4877-89ec-86db57ef9e4a resourceVersion: "6514" uid: 8b49c86a-9ef0-44a9-afba-2e3c636a075a type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-16T08:29:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"56030cfe-68c0-440f-a6a2-c9bcd05a26d6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T08:29:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T09:05:52Z" name: dns-dockercfg-l2kgt namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 56030cfe-68c0-440f-a6a2-c9bcd05a26d6 resourceVersion: "16104" uid: e3c958c0-8eba-4b96-bd9f-789e5e9fcc21 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-16T08:29:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4effbfa0-15b2-45da-987d-243034299307"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T08:29:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T09:05:52Z" name: node-resolver-dockercfg-j754g namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 4effbfa0-15b2-45da-987d-243034299307 resourceVersion: "16079" uid: 0aa1666a-7a7c-4638-ac30-fa8f16ebf2d6 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "17910"