--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T17:37:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0d33417a-b6b4-47e8-8db7-bd46a292b1a7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:37:13Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:13:13Z" name: builder-dockercfg-87q87 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 0d33417a-b6b4-47e8-8db7-bd46a292b1a7 resourceVersion: "26233" uid: fc8bc6ca-ec5e-4631-aaa2-2a0c663b3af4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T17:37:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d084e857-979c-4cfa-b5cf-c254099d88d1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:37:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:13:08Z" name: default-dockercfg-p9q96 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: d084e857-979c-4cfa-b5cf-c254099d88d1 resourceVersion: "26082" uid: a53fa768-de22-48b5-bf5b-a0ab42f84af1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T17:37:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2032f83a-0040-44f1-bf89-347b046124d1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:37:13Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:13:13Z" name: deployer-dockercfg-5nblf namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 2032f83a-0040-44f1-bf89-347b046124d1 resourceVersion: "26228" uid: e4bbca75-837c-471c-9204-bd5da01ab1b2 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T17:40:58Z" service.beta.openshift.io/expiry: "2028-04-15T17:40:58Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 55faf4c6-fa0c-4fd7-9c8a-20c8708f4e48 creationTimestamp: "2026-04-16T17:40:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"55faf4c6-fa0c-4fd7-9c8a-20c8708f4e48"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T17:40:59Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 55faf4c6-fa0c-4fd7-9c8a-20c8708f4e48 resourceVersion: "6787" uid: dfdd591c-47a8-4a4c-a856-8ed3c8ded0b3 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-16T17:37:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"473d6af8-06f9-4009-8fb6-69aecd442758"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:37:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:13:08Z" name: dns-dockercfg-tjhv5 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 473d6af8-06f9-4009-8fb6-69aecd442758 resourceVersion: "26087" uid: e5420f04-766f-4019-b13a-830a7d9b329e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-16T17:37:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b0839968-05ce-4152-8731-51ff70d55256"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:37:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:13:08Z" name: node-resolver-dockercfg-8m9jf namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: b0839968-05ce-4152-8731-51ff70d55256 resourceVersion: "26067" uid: 0bade0dc-d239-4d1f-b91f-ffd9eac4624a type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "33091"