--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T18:06:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b02e712b-47a6-4f74-bc3d-4926912d1170"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T18:06:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T18:06:55Z" name: builder-dockercfg-wglps namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: b02e712b-47a6-4f74-bc3d-4926912d1170 resourceVersion: "4123" uid: 762773cf-07f4-4478-b4b9-17d2161b8ee2 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T18:06:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"25362828-af2a-4d39-8e02-8d58caa936fd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T18:06:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T18:06:52Z" name: default-dockercfg-fr8vr namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 25362828-af2a-4d39-8e02-8d58caa936fd resourceVersion: "3577" uid: 4d0cbbf7-7d7e-4c11-bce8-b0f10d758265 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T18:06:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"38313b46-4021-420d-90a8-3a4e732f7f13"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T18:06:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T18:06:55Z" name: deployer-dockercfg-4r2n2 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 38313b46-4021-420d-90a8-3a4e732f7f13 resourceVersion: "4116" uid: 7250f79f-b84d-4700-9e7f-0d935ff60be3 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T18:12:33Z" service.beta.openshift.io/expiry: "2028-04-16T18:12:33Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 72211a60-e549-41e5-a17f-7eb66d19785a creationTimestamp: "2026-04-17T18:12:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"72211a60-e549-41e5-a17f-7eb66d19785a"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T18:12:34Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 72211a60-e549-41e5-a17f-7eb66d19785a resourceVersion: "7734" uid: dfb29a70-306f-4e98-a001-33f12c36deaf type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-17T18:06:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"743b5fba-c0b1-463f-9b33-1fe0b92bac7d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T18:06:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T18:06:52Z" name: dns-dockercfg-46dtx namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 743b5fba-c0b1-463f-9b33-1fe0b92bac7d resourceVersion: "3569" uid: c0f8c219-15ef-4b9d-ae1a-25d90916d453 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-17T18:06:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ec265659-9c49-4c0c-ba97-d8cc575c164d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T18:06:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T18:06:52Z" name: node-resolver-dockercfg-sk7kv namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: ec265659-9c49-4c0c-ba97-d8cc575c164d resourceVersion: "3574" uid: 54183c31-4874-4ed9-85d2-b8a1fc8681be type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "14352"