--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T18:06:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ac3af191-0ccc-4688-804e-993d3c6d29a3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:06:23Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:42:23Z" name: builder-dockercfg-sbrcn namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: ac3af191-0ccc-4688-804e-993d3c6d29a3 resourceVersion: "37888" uid: 8d443ced-7dc0-4538-848d-2b1eed893edc type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T18:06:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4b5ad364-44b2-4322-8c77-b8f0a26c472c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:06:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:42:18Z" name: default-dockercfg-nwkb6 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 4b5ad364-44b2-4322-8c77-b8f0a26c472c resourceVersion: "37707" uid: 4ed52046-ddb0-4cfa-8264-9b5994e7b0f3 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T18:06:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"30934f12-e804-4e18-8b32-5e646275cd33"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:06:23Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:42:23Z" name: deployer-dockercfg-tk9rk namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 30934f12-e804-4e18-8b32-5e646275cd33 resourceVersion: "37886" uid: 13bd7f4d-02aa-4e22-b097-957076fae91f type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T18:12:06Z" service.beta.openshift.io/expiry: "2028-04-15T18:12:06Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: a66bf993-1fa3-49e6-a8e7-6b5abc8e97d5 creationTimestamp: "2026-04-16T18:12:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"a66bf993-1fa3-49e6-a8e7-6b5abc8e97d5"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T18:12:07Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: a66bf993-1fa3-49e6-a8e7-6b5abc8e97d5 resourceVersion: "7729" uid: e68e6598-47d0-46ca-bd0e-cf0647164751 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-16T18:06:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7e10b338-777b-497f-9247-69bfc81c04c9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:06:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:42:18Z" name: dns-dockercfg-bnqh9 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 7e10b338-777b-497f-9247-69bfc81c04c9 resourceVersion: "37698" uid: 05126fae-abd4-4973-aad6-c630bea9c955 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-16T18:06:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c73d8483-b9db-41af-ba6c-4c044415fc8e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:06:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:42:18Z" name: node-resolver-dockercfg-8bqjb namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: c73d8483-b9db-41af-ba6c-4c044415fc8e resourceVersion: "37716" uid: 3745dc10-e127-4b0d-933c-6dbb91b169d9 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "39358"