--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T19:51:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ccec13e1-5951-45d5-be8b-baf3c5f83f7f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:51:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:27:01Z" name: builder-dockercfg-97tqn namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: ccec13e1-5951-45d5-be8b-baf3c5f83f7f resourceVersion: "25875" uid: 1b14ec1d-d4b0-4e7c-b032-98befbb34b24 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T19:50:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fc6ada8c-ce95-479c-9cbf-db9be4dbbdc5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:50:56Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:26:57Z" name: default-dockercfg-wzlqb namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: fc6ada8c-ce95-479c-9cbf-db9be4dbbdc5 resourceVersion: "25748" uid: 5fc9b462-ce30-494e-bce7-9014806a93b5 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T19:51:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c1c31cb3-1d7e-44cf-ad87-19b097842467"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:51:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:27:01Z" name: deployer-dockercfg-pggcj namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: c1c31cb3-1d7e-44cf-ad87-19b097842467 resourceVersion: "25874" uid: 8853dd57-485f-4a43-9778-3f0657b5b3d7 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T19:54:26Z" service.beta.openshift.io/expiry: "2028-04-15T19:54:26Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: f46153a9-c818-4185-b416-e63ed707a2e7 creationTimestamp: "2026-04-16T19:54:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"f46153a9-c818-4185-b416-e63ed707a2e7"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T19:54:27Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: f46153a9-c818-4185-b416-e63ed707a2e7 resourceVersion: "7072" uid: 489afb66-483d-47ee-80f6-0810306064f3 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-16T19:50:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"47f7786f-ad74-4c61-8176-230dfbb5a4a5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:50:56Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:26:57Z" name: dns-dockercfg-8flcv namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 47f7786f-ad74-4c61-8176-230dfbb5a4a5 resourceVersion: "25746" uid: 4993a5bc-99bc-4f37-886e-880d0c481fc3 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-16T19:50:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"81cd57cc-a869-435b-8302-7391081b2275"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:50:56Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:26:57Z" name: node-resolver-dockercfg-r5qgr namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 81cd57cc-a869-435b-8302-7391081b2275 resourceVersion: "25752" uid: 45559c1a-608e-4704-a386-0abab081d5ba type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "41657"