--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T16:44:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"29a461d5-26bf-4f19-8042-e7453c4eccd5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T16:44:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T16:44:55Z" name: builder-dockercfg-zfm2f namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 29a461d5-26bf-4f19-8042-e7453c4eccd5 resourceVersion: "4257" uid: 6554f7c8-4010-40ba-9298-e75863ed505b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T16:44:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"86493201-3012-4bbe-8461-fd093268fa25"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T16:44:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T16:44:53Z" name: default-dockercfg-vlrrz namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 86493201-3012-4bbe-8461-fd093268fa25 resourceVersion: "4091" uid: 353c11b6-331d-4b50-af12-5bcbbcb06f2b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T16:44:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f3a4dd5e-bc3e-4e80-9ae9-2c28ab09ee94"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T16:44:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T16:44:55Z" name: deployer-dockercfg-hbrt6 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: f3a4dd5e-bc3e-4e80-9ae9-2c28ab09ee94 resourceVersion: "4258" uid: a09f709a-224f-439a-bc41-ac81882aaaae type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T16:50:09Z" service.beta.openshift.io/expiry: "2028-04-15T16:50:09Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 927ce2d7-11c1-429f-b28f-3e42d12d718e creationTimestamp: "2026-04-16T16:50:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"927ce2d7-11c1-429f-b28f-3e42d12d718e"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T16:50:10Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 927ce2d7-11c1-429f-b28f-3e42d12d718e resourceVersion: "7428" uid: 617ce849-1c48-496c-99a1-0929e98f53e8 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-16T16:44:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"dd7afa06-39aa-410f-b6bb-9bf4cb618c82"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T16:44:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T16:44:53Z" name: dns-dockercfg-z7whv namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: dd7afa06-39aa-410f-b6bb-9bf4cb618c82 resourceVersion: "4090" uid: 111e7de3-b526-4e54-b950-019a1d4173b8 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-16T16:44:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7c1b727f-2526-4b73-b578-e174eb4e9301"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T16:44:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T16:44:53Z" name: node-resolver-dockercfg-l4c4x namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 7c1b727f-2526-4b73-b578-e174eb4e9301 resourceVersion: "4093" uid: 91a0ee89-6b08-453b-8431-1165279bcd05 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "20636"