--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-21T03:54:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"44333ee6-b5a0-403e-a34b-86283f77d386"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T03:54:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:30:36Z" name: builder-dockercfg-n4ksz namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 44333ee6-b5a0-403e-a34b-86283f77d386 resourceVersion: "26342" uid: 17144cfc-0afe-453a-b38b-587a5dda69ba type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-21T03:54:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"25340f47-0067-40c4-908b-db0933815162"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T03:54:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:30:30Z" name: default-dockercfg-2tst7 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 25340f47-0067-40c4-908b-db0933815162 resourceVersion: "26145" uid: 8f9d485c-bef3-488e-890d-d92b11f36aba type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-21T03:54:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5d3e13dd-9f48-41c7-b440-64b0d83564ed"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T03:54:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:30:36Z" name: deployer-dockercfg-w4z6w namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 5d3e13dd-9f48-41c7-b440-64b0d83564ed resourceVersion: "26344" uid: efc22498-ff21-4b72-b7a3-043170cd5461 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T03:58:07Z" service.beta.openshift.io/expiry: "2028-04-20T03:58:07Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 35a38a1a-d33e-4cf8-863f-9827bdbdea2e creationTimestamp: "2026-04-21T03:58:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"35a38a1a-d33e-4cf8-863f-9827bdbdea2e"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T03:58:08Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 35a38a1a-d33e-4cf8-863f-9827bdbdea2e resourceVersion: "7329" uid: a257d5cf-dfe6-4413-9463-c81c06e50724 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-21T03:54:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"43d68f07-f811-4243-8724-6b506da4d182"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T03:54:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:30:30Z" name: dns-dockercfg-lrpqk namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 43d68f07-f811-4243-8724-6b506da4d182 resourceVersion: "26163" uid: b87d88a9-6baa-4f76-90bc-6ca39ca8ccb4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-21T03:54:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3ffe2671-8c73-4f71-a8ae-52e6671bd85c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T03:54:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:30:30Z" name: node-resolver-dockercfg-8qztf namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 3ffe2671-8c73-4f71-a8ae-52e6671bd85c resourceVersion: "26158" uid: bef6be1b-3292-4519-9532-6dde787c4cee type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "41829"