--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T14:04:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4707ab01-b940-4208-8e47-ebaf50661c43"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:04:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:40:06Z" name: builder-dockercfg-dvwmw namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 4707ab01-b940-4208-8e47-ebaf50661c43 resourceVersion: "22177" uid: b5aba433-5aae-485f-a20a-10c68ee2de6a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T14:03:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"56c05f18-e5fc-402c-8050-35357f73e0bb"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:03:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:40:02Z" name: default-dockercfg-gx7v9 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 56c05f18-e5fc-402c-8050-35357f73e0bb resourceVersion: "21962" uid: d62f35e5-d001-4317-83eb-b9f0a22c77ac type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T14:04:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"17a5e38e-67bb-4b06-acb1-50e317c1cafb"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:04:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:40:06Z" name: deployer-dockercfg-9qbcv namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 17a5e38e-67bb-4b06-acb1-50e317c1cafb resourceVersion: "22152" uid: 88ee5bb5-5779-4433-9313-4ee380c0b922 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T14:09:34Z" service.beta.openshift.io/expiry: "2028-04-16T14:09:34Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 83daf34a-118d-4317-b40c-1a7f1afb0b96 creationTimestamp: "2026-04-17T14:09:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"83daf34a-118d-4317-b40c-1a7f1afb0b96"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T14:09:34Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 83daf34a-118d-4317-b40c-1a7f1afb0b96 resourceVersion: "7725" uid: df144195-a145-4faf-9bfb-15bfa6165956 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-17T14:03:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"de0807de-9769-4bac-95d0-83ffdebb0568"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:03:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:40:02Z" name: dns-dockercfg-fnmsv namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: de0807de-9769-4bac-95d0-83ffdebb0568 resourceVersion: "21968" uid: f055808b-2ef1-40d8-b0cc-d1acfd2f5f13 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-17T14:03:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"456ecfda-7972-44e7-a249-762ce89b31a6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:03:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:40:03Z" name: node-resolver-dockercfg-dss5c namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 456ecfda-7972-44e7-a249-762ce89b31a6 resourceVersion: "22022" uid: f989a610-b788-452f-9978-400defee1220 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "28126"