--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-23T09:27:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e2e99aca-01ce-4817-bcef-3067b709870a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T09:27:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T09:28:01Z" name: builder-dockercfg-lj7kl namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: e2e99aca-01ce-4817-bcef-3067b709870a resourceVersion: "4047" uid: e2249f53-bd2f-43f7-9b67-145512fdfb2d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-23T09:27:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"515b3609-f9da-4f5f-a775-98d767c15296"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T09:27:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T09:27:59Z" name: default-dockercfg-98bnl namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 515b3609-f9da-4f5f-a775-98d767c15296 resourceVersion: "3903" uid: 4a4bca37-c0e5-4449-8bd8-0f5fd5fb8b4a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-23T09:27:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"71076cfd-1b9f-4766-9641-214f0059f2b7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T09:27:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T09:28:01Z" name: deployer-dockercfg-tbrwc namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 71076cfd-1b9f-4766-9641-214f0059f2b7 resourceVersion: "4046" uid: 4818e521-ad48-4894-9de2-25331085a585 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-22T09:31:35Z" service.beta.openshift.io/expiry: "2028-04-22T09:31:35Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 2923255a-3641-4935-82d3-3baa7fea84db creationTimestamp: "2026-04-23T09:31:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"2923255a-3641-4935-82d3-3baa7fea84db"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-23T09:31:36Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 2923255a-3641-4935-82d3-3baa7fea84db resourceVersion: "7269" uid: c81e1217-9637-4aa4-b3f5-c4d55c289423 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-23T09:27:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"22848b2f-a694-4bf6-b57e-ee37da95edff"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T09:27:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T09:27:59Z" name: dns-dockercfg-mvkwp namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 22848b2f-a694-4bf6-b57e-ee37da95edff resourceVersion: "3904" uid: 8a561c00-91ae-443e-aa09-f9eb9b0ae5d8 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-23T09:27:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5efeade4-3083-4538-a575-012742039a01"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T09:27:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T09:27:59Z" name: node-resolver-dockercfg-c65vd namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 5efeade4-3083-4538-a575-012742039a01 resourceVersion: "3907" uid: ccc25b84-c498-493a-86a6-2f7ed64c9409 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "15973"