--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T16:27:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1989611c-21e5-4be3-8b94-f47901c65b34"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:27:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:03:46Z" name: builder-dockercfg-b7vmx namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 1989611c-21e5-4be3-8b94-f47901c65b34 resourceVersion: "25601" uid: 2132e461-3fe3-4d68-8486-84832774ffb6 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T16:27:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"da0ae9e5-ef89-4d25-adc4-a98069f3d122"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:27:41Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:03:41Z" name: default-dockercfg-wv5nh namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: da0ae9e5-ef89-4d25-adc4-a98069f3d122 resourceVersion: "25281" uid: a8787e97-cc86-4033-8354-21113a35ac5a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T16:27:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9ab09799-268e-49b6-b1ab-697ae2ded8dd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:27:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:03:46Z" name: deployer-dockercfg-dvkfc namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 9ab09799-268e-49b6-b1ab-697ae2ded8dd resourceVersion: "25609" uid: 38fa25c1-d6b7-4ec2-9a3e-eaf7419f658f type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T16:33:35Z" service.beta.openshift.io/expiry: "2028-04-16T16:33:35Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: aa5eeb5d-fd42-4fbb-a611-f2b1a0f578fd creationTimestamp: "2026-04-17T16:33:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"aa5eeb5d-fd42-4fbb-a611-f2b1a0f578fd"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T16:33:36Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: aa5eeb5d-fd42-4fbb-a611-f2b1a0f578fd resourceVersion: "7601" uid: ece0f9e3-b420-436b-be2c-83cb2727d68c type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-17T16:27:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a52ad1ca-85e4-4db1-929e-b914a533e0c3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:27:41Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:03:41Z" name: dns-dockercfg-dbwrt namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: a52ad1ca-85e4-4db1-929e-b914a533e0c3 resourceVersion: "25311" uid: 6beab72d-de2a-4600-8a88-fb2d0f2c4b76 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-17T16:27:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2279a569-dfb7-450f-9c71-7992a584e967"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:27:41Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:03:41Z" name: node-resolver-dockercfg-xwt9g namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 2279a569-dfb7-450f-9c71-7992a584e967 resourceVersion: "25314" uid: 8600a248-b284-4a3d-8759-aaf3ed06ec75 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "33906"