--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T18:06:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c7ba6c7c-a0c0-426c-927a-11b03a6da584"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:06:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:42:35Z" name: builder-dockercfg-mg4pf namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: c7ba6c7c-a0c0-426c-927a-11b03a6da584 resourceVersion: "25538" uid: d930e548-81a6-4b37-8ab0-bca58d9ceb15 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T18:06:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e7a2d5de-1ee5-44b4-9da0-d76748eba455"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:06:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:42:30Z" name: default-dockercfg-slrzt namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: e7a2d5de-1ee5-44b4-9da0-d76748eba455 resourceVersion: "25378" uid: 5bad9380-9996-4c11-b677-4eb6b7c9b97a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T18:06:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7ed9dd54-ea78-4124-b5e7-e46dc2c285fd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:06:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:42:35Z" name: deployer-dockercfg-r69sh namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 7ed9dd54-ea78-4124-b5e7-e46dc2c285fd resourceVersion: "25539" uid: 6e7c7201-7fbe-451e-8749-bfdc7a35aeba type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T18:11:52Z" service.beta.openshift.io/expiry: "2028-04-15T18:11:52Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 2b6fb222-f1f7-41c7-a6e9-95249b027ea0 creationTimestamp: "2026-04-16T18:11:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"2b6fb222-f1f7-41c7-a6e9-95249b027ea0"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T18:11:52Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 2b6fb222-f1f7-41c7-a6e9-95249b027ea0 resourceVersion: "7604" uid: ad2a10cc-812d-4abd-92cf-ef905474a01a type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-16T18:06:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e572eafa-a707-426d-a45a-d42eb5a1601b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:06:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:42:30Z" name: dns-dockercfg-n88vn namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: e572eafa-a707-426d-a45a-d42eb5a1601b resourceVersion: "25377" uid: 2fdd7003-7b3d-40b8-914c-ae2cc11112fe type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-16T18:06:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8690e39c-1bca-49d4-9e24-1988a2a43c76"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:06:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:42:30Z" name: node-resolver-dockercfg-2phrw namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 8690e39c-1bca-49d4-9e24-1988a2a43c76 resourceVersion: "25376" uid: 2a0df4e5-fc1e-48ab-82a9-97e82deb63f2 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "41581"