--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T18:06:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"35a47fd9-4bea-4903-b32f-e856ec5d3fdb"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:06:45Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:42:46Z" name: builder-dockercfg-p299j namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 35a47fd9-4bea-4903-b32f-e856ec5d3fdb resourceVersion: "26379" uid: 85bae1fa-b20d-433d-a11b-a60c4cf3bc67 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T18:06:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d9262bf0-2d48-4ad9-9346-83ef0f43f8c8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:06:40Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:42:40Z" name: default-dockercfg-qnl8k namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: d9262bf0-2d48-4ad9-9346-83ef0f43f8c8 resourceVersion: "26184" uid: ef1c39b2-a5de-42eb-997e-ad7703fbed15 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T18:06:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"920f7cf6-6277-4fc6-bf21-fb33a20a3b07"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:06:45Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:42:46Z" name: deployer-dockercfg-cpblp namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 920f7cf6-6277-4fc6-bf21-fb33a20a3b07 resourceVersion: "26381" uid: 87078ad9-2128-4e53-8ef8-6339d9fe2d1b type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T18:10:33Z" service.beta.openshift.io/expiry: "2028-04-15T18:10:33Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: a74b55f0-6088-40d3-ae5a-d94cc4f39e70 creationTimestamp: "2026-04-16T18:10:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"a74b55f0-6088-40d3-ae5a-d94cc4f39e70"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T18:10:34Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: a74b55f0-6088-40d3-ae5a-d94cc4f39e70 resourceVersion: "7255" uid: ead14127-e7ce-4232-bfb5-ead5e1bd6a85 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-16T18:06:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7f7b152a-6c50-4688-a917-8fca9dcc7fb0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:06:40Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:42:40Z" name: dns-dockercfg-xkg79 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 7f7b152a-6c50-4688-a917-8fca9dcc7fb0 resourceVersion: "26190" uid: 79f12ab3-17ef-4ce3-8686-3be3a23198c3 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-16T18:06:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8584f138-139d-4f47-9ad6-70f011458a06"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:06:40Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:42:40Z" name: node-resolver-dockercfg-j5k87 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 8584f138-139d-4f47-9ad6-70f011458a06 resourceVersion: "26183" uid: 2e31b35d-d74a-4418-9c36-d9e3668f53cd type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "33231"