--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T11:12:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e6f16af5-be2c-47b1-9a77-ffdd8e73b3e8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:12:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:12:38Z" name: builder-dockercfg-5v9cq namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: e6f16af5-be2c-47b1-9a77-ffdd8e73b3e8 resourceVersion: "3337" uid: edbeb9b3-53ec-4e43-8053-abe7b2382f77 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T11:12:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:12:33Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"22395967-b670-4e28-98bf-105dd8fac8b7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:12:33Z" name: default-dockercfg-q4lck namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 22395967-b670-4e28-98bf-105dd8fac8b7 resourceVersion: "2785" uid: c3f9b6a8-10df-4a44-b399-dad54b5eca58 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T11:12:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"696a7847-ed6e-464c-b7b2-b4fe50b882c4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:12:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:12:38Z" name: deployer-dockercfg-gmhml namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 696a7847-ed6e-464c-b7b2-b4fe50b882c4 resourceVersion: "3339" uid: 29e3f31a-7c46-43eb-9214-8dcafc933a1c type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T11:18:40Z" service.beta.openshift.io/expiry: "2028-04-16T11:18:40Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: de71bda8-48b6-43fe-b184-9cbfe53a8a64 creationTimestamp: "2026-04-17T11:18:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"de71bda8-48b6-43fe-b184-9cbfe53a8a64"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T11:18:40Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: de71bda8-48b6-43fe-b184-9cbfe53a8a64 resourceVersion: "7829" uid: 5e1f6c60-6505-496a-a9ce-9bb47b58193f type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-17T11:12:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:12:33Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"79e2305f-9ba7-49b1-bd6f-d8ef33a68340"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:12:33Z" name: dns-dockercfg-mvwdc namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 79e2305f-9ba7-49b1-bd6f-d8ef33a68340 resourceVersion: "2807" uid: f0b08473-329f-45ce-8dc6-be2bc3df738b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-17T11:12:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:12:33Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a8743fbe-4c06-4d84-b659-74b4525099d1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:12:33Z" name: node-resolver-dockercfg-s9wql namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: a8743fbe-4c06-4d84-b659-74b4525099d1 resourceVersion: "2816" uid: d72f833a-0fca-4f7c-8af3-3c37cc01b502 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "14057"