--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-21T15:58:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"214452c7-0be0-48c8-8227-6bea18b65b84"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T15:58:05Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T16:34:33Z" name: builder-dockercfg-fb9hs namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 214452c7-0be0-48c8-8227-6bea18b65b84 resourceVersion: "42743" uid: 990311ea-596a-458a-90a7-e64a382de1f9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-21T15:58:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8e256965-bf0c-47e0-848d-f0dc5f15d589"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T15:58:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T16:34:31Z" name: default-dockercfg-7mzm5 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 8e256965-bf0c-47e0-848d-f0dc5f15d589 resourceVersion: "42546" uid: 296cfad5-cf78-47b6-a1bf-bb24846a0f35 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-21T15:58:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b0f899a7-043e-4f78-82d6-56b9f8adb83c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T15:58:05Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T16:34:33Z" name: deployer-dockercfg-cptl8 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: b0f899a7-043e-4f78-82d6-56b9f8adb83c resourceVersion: "42702" uid: c397a403-eed6-4faf-b639-4870eeda6b7c type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T16:04:04Z" service.beta.openshift.io/expiry: "2028-04-20T16:04:04Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 43df313d-183c-4d83-b725-512fba237497 creationTimestamp: "2026-04-21T16:04:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"43df313d-183c-4d83-b725-512fba237497"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T16:04:05Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 43df313d-183c-4d83-b725-512fba237497 resourceVersion: "7725" uid: af0a2cbd-abe5-47d1-8a60-be8a584119e4 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-21T15:58:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"80724f08-b6e1-4999-ac66-81b9a37203c5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T15:58:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T16:34:31Z" name: dns-dockercfg-2l66p namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 80724f08-b6e1-4999-ac66-81b9a37203c5 resourceVersion: "42576" uid: f3dc2fa5-6daa-4a88-8809-6cc64ba1999e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-21T15:58:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2f90ccac-147c-4f48-93ea-92df319e3edf"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T15:58:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T16:34:31Z" name: node-resolver-dockercfg-zpz2n namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 2f90ccac-147c-4f48-93ea-92df319e3edf resourceVersion: "42488" uid: 2696b5ab-3cf5-4f03-8f32-925e0e0121c3 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "46365"