--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T15:08:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"08caf2d4-3fda-4915-bbec-a82fbaa58617"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T15:08:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:44:50Z" name: builder-dockercfg-v8g2x namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 08caf2d4-3fda-4915-bbec-a82fbaa58617 resourceVersion: "42668" uid: bea6c459-6de5-47ee-95c6-b8fb5427f7ec type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T15:08:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b35880a6-65ef-4d6b-8d6d-ad0d3a820ccc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T15:08:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:44:44Z" name: default-dockercfg-mvb6z namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: b35880a6-65ef-4d6b-8d6d-ad0d3a820ccc resourceVersion: "42427" uid: b7d9663c-0d28-4987-8c4a-db313f44420a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T15:08:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6eed6462-174c-4a11-9fa9-cce67b2feca4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T15:08:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:44:50Z" name: deployer-dockercfg-xkhzp namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 6eed6462-174c-4a11-9fa9-cce67b2feca4 resourceVersion: "42688" uid: 97173b12-2a2a-46fb-860f-7df559e212f8 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T15:14:18Z" service.beta.openshift.io/expiry: "2028-04-15T15:14:18Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 8c47a6aa-50df-44e0-9514-9c723144f7cb creationTimestamp: "2026-04-16T15:14:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"8c47a6aa-50df-44e0-9514-9c723144f7cb"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T15:14:18Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 8c47a6aa-50df-44e0-9514-9c723144f7cb resourceVersion: "7696" uid: 651b8e3a-3f3e-41cd-930a-e612e323067d type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-16T15:08:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"82aa661f-b0f5-47cc-acb5-c0883c9b0218"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T15:08:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:44:44Z" name: dns-dockercfg-xrkdr namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 82aa661f-b0f5-47cc-acb5-c0883c9b0218 resourceVersion: "42450" uid: 8c9c120f-8aa7-4ec7-88cd-e720b6f8e843 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-16T15:08:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ea01748a-4e71-4fd2-8d7c-b33cdc6a4b2e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T15:08:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:44:44Z" name: node-resolver-dockercfg-8824q namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: ea01748a-4e71-4fd2-8d7c-b33cdc6a4b2e resourceVersion: "42439" uid: 221097ba-4bff-4054-99bb-78dc789e023f type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "46658"