--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T19:50:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"da865b87-3d8f-4ab5-9b96-e308f02711f7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:50:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:26:44Z" name: builder-dockercfg-nbqw9 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: da865b87-3d8f-4ab5-9b96-e308f02711f7 resourceVersion: "26232" uid: c581c79f-bd46-45f5-9392-4859682c7599 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T19:50:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2d01599d-9e30-48e8-8aaa-1c2a59c740f8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:50:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:26:43Z" name: default-dockercfg-trx4q namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 2d01599d-9e30-48e8-8aaa-1c2a59c740f8 resourceVersion: "26133" uid: bed57607-c4d8-4764-bfc6-81d181c45865 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T19:50:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3d5165b1-b762-47f1-8db8-281705332051"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:50:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:26:44Z" name: deployer-dockercfg-5x55p namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 3d5165b1-b762-47f1-8db8-281705332051 resourceVersion: "26255" uid: f1f2873a-412b-4920-9c88-190e86709591 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T19:54:34Z" service.beta.openshift.io/expiry: "2028-04-15T19:54:34Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 588373b3-55c0-421e-8e86-0031057b01ed creationTimestamp: "2026-04-16T19:54:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"588373b3-55c0-421e-8e86-0031057b01ed"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T19:54:34Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 588373b3-55c0-421e-8e86-0031057b01ed resourceVersion: "6815" uid: 156ca925-fb8d-43ca-b1ad-638e23a22c91 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-16T19:50:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"730cf7ec-935e-46eb-8df4-90e0a80fccbc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:50:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:26:43Z" name: dns-dockercfg-dknqq namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 730cf7ec-935e-46eb-8df4-90e0a80fccbc resourceVersion: "26121" uid: 73ad2c48-2e36-430f-86bb-82a4cbe02127 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-16T19:50:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2ecf72e3-105c-4bc8-b04e-794261e6ed80"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:50:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:26:43Z" name: node-resolver-dockercfg-wgp9m namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 2ecf72e3-105c-4bc8-b04e-794261e6ed80 resourceVersion: "26144" uid: 68dcfbe5-b0bf-44ac-9062-09b4b1051d20 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "32618"