--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T13:19:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"daf7ec9d-1007-4cb7-95bd-18edcd55e091"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T13:19:53Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T13:55:53Z" name: builder-dockercfg-pt7xb namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: daf7ec9d-1007-4cb7-95bd-18edcd55e091 resourceVersion: "22161" uid: 8786bc08-dfe2-4416-9013-c3a7ca05654e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T13:19:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cf636e4c-141f-4585-8af0-3c4a7d6d014e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T13:19:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T13:55:48Z" name: default-dockercfg-cbj5s namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: cf636e4c-141f-4585-8af0-3c4a7d6d014e resourceVersion: "22011" uid: a98cdc3e-29a2-4b02-a89d-a3c48e5db602 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T13:19:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a7c2bc43-0baa-426e-b1a5-0bf41b0e01af"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T13:19:53Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T13:55:53Z" name: deployer-dockercfg-j262w namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: a7c2bc43-0baa-426e-b1a5-0bf41b0e01af resourceVersion: "22143" uid: 02af4898-7fe9-4bf5-a6d8-8d53a01d46ba type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T13:21:49Z" service.beta.openshift.io/expiry: "2028-04-21T13:21:49Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: f4f28ca6-7f0d-4b21-a702-0d4aab544f4d creationTimestamp: "2026-04-22T13:21:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"f4f28ca6-7f0d-4b21-a702-0d4aab544f4d"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T13:21:50Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: f4f28ca6-7f0d-4b21-a702-0d4aab544f4d resourceVersion: "6576" uid: ad633b76-ec5a-46f6-80ec-3167b7755032 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxMiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-22T13:19:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5101aea8-80ed-4a19-8561-d62e56d6e8c3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T13:19:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T13:55:48Z" name: dns-dockercfg-rrhbx namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 5101aea8-80ed-4a19-8561-d62e56d6e8c3 resourceVersion: "22008" uid: d1465908-af86-49a0-a50a-dee6df9f256a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-22T13:19:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"752079d3-ee8f-4491-9e5b-12e710343678"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T13:19:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T13:55:49Z" name: node-resolver-dockercfg-bwhcj namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 752079d3-ee8f-4491-9e5b-12e710343678 resourceVersion: "22022" uid: 450b4f0f-7c49-4db4-8a28-a3d97bdebdb3 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "27122"