--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T07:59:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T07:59:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4911bb90-bbdc-43cc-8f6e-737c7bc86013"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:59:15Z" name: builder-dockercfg-t9vhs namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 4911bb90-bbdc-43cc-8f6e-737c7bc86013 resourceVersion: "4075" uid: 156e1231-759c-4a3d-9fc7-c00aa0556856 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T07:59:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8aec7b22-e48e-4ccc-9f61-b5d86a7c5eb6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:59:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T07:59:10Z" name: default-dockercfg-wblxr namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 8aec7b22-e48e-4ccc-9f61-b5d86a7c5eb6 resourceVersion: "3469" uid: 47d0bc0a-c9d1-4e17-829d-3336eb9b6018 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T07:59:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T07:59:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"92dfa1a4-355d-4ce5-92e9-269370d63980"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:59:15Z" name: deployer-dockercfg-sqvzx namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 92dfa1a4-355d-4ce5-92e9-269370d63980 resourceVersion: "4076" uid: f6eafb91-98dc-4f0d-8f03-3c336aec6340 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T08:04:44Z" service.beta.openshift.io/expiry: "2028-04-16T08:04:44Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 5c3574ce-052b-4977-af78-6f700532ce05 creationTimestamp: "2026-04-17T08:04:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"5c3574ce-052b-4977-af78-6f700532ce05"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T08:04:44Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 5c3574ce-052b-4977-af78-6f700532ce05 resourceVersion: "7676" uid: 1acdbca9-667a-4816-8f13-af4932bd0e42 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-17T07:59:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8effca11-b60c-434d-a232-503025e39656"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:59:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T07:59:10Z" name: dns-dockercfg-wdhxs namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 8effca11-b60c-434d-a232-503025e39656 resourceVersion: "3470" uid: 1665d33d-8be5-4de7-8edf-514fcef3f34c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-17T07:59:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6e63f3e7-621b-42d5-b4d6-99cfeaab4645"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:59:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T07:59:10Z" name: node-resolver-dockercfg-lx6b2 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 6e63f3e7-621b-42d5-b4d6-99cfeaab4645 resourceVersion: "3471" uid: e3afcd08-b700-47db-a5d6-41c08b49ba29 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "13378"