--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T20:08:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ae59912f-3c94-4d50-8b16-3122b2882dcd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T20:08:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:44:39Z" name: builder-dockercfg-v9w5c namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: ae59912f-3c94-4d50-8b16-3122b2882dcd resourceVersion: "26342" uid: 4b3fadf3-cc51-4437-86ad-1cf93c4fa0e6 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T20:08:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"32528553-1a17-408b-bbaf-a68bea1e2653"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T20:08:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:44:34Z" name: default-dockercfg-g85ll namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 32528553-1a17-408b-bbaf-a68bea1e2653 resourceVersion: "26175" uid: 1bf59281-e50f-4a2b-9587-82fd2f48eda6 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T20:08:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b1ea4381-7060-408f-9804-c9df5026f524"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T20:08:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:44:39Z" name: deployer-dockercfg-mt5kj namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: b1ea4381-7060-408f-9804-c9df5026f524 resourceVersion: "26341" uid: 69a123d2-811b-4e35-bc98-0bb3ce8cb5ce type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T20:12:11Z" service.beta.openshift.io/expiry: "2028-04-15T20:12:11Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 4eb8b432-acc4-496e-a03b-ad28a04fc85c creationTimestamp: "2026-04-16T20:12:11Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"4eb8b432-acc4-496e-a03b-ad28a04fc85c"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T20:12:11Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 4eb8b432-acc4-496e-a03b-ad28a04fc85c resourceVersion: "6861" uid: 718b8c49-4442-4881-a724-7e988d25918a type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-16T20:08:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6ca2ef63-9bee-4e0c-8430-1ff8fb6f0bec"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T20:08:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:44:34Z" name: dns-dockercfg-tnjdz namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 6ca2ef63-9bee-4e0c-8430-1ff8fb6f0bec resourceVersion: "26187" uid: 5b5dd8df-3d6d-4365-bca4-a0e722569933 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-16T20:08:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"907b0cf4-f57c-4817-9386-e01c0e7bf8e7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T20:08:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:44:34Z" name: node-resolver-dockercfg-gwpsm namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 907b0cf4-f57c-4817-9386-e01c0e7bf8e7 resourceVersion: "26189" uid: 1783eb90-72ec-4638-82ac-4b47fad98af2 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "32965"