--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-23T01:06:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4a5f303a-ef89-47f2-a224-938b4dbcdea2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T01:06:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T01:42:42Z" name: builder-dockercfg-s9kng namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 4a5f303a-ef89-47f2-a224-938b4dbcdea2 resourceVersion: "44672" uid: bfe2d268-08c6-4c85-8f9f-51786b0783d1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-23T01:06:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"51fdaef5-e739-4a0b-83ad-b0e3b0e9feee"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T01:06:12Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T01:42:40Z" name: default-dockercfg-mrhbh namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 51fdaef5-e739-4a0b-83ad-b0e3b0e9feee resourceVersion: "44444" uid: 1a50ddd8-506d-4865-9ff3-ab43341d65f4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-23T01:06:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5d426012-aacd-4bdf-9b4d-0433b1994fda"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T01:06:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T01:42:42Z" name: deployer-dockercfg-whkqz namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 5d426012-aacd-4bdf-9b4d-0433b1994fda resourceVersion: "44639" uid: 1c1cb77e-6f07-4301-8753-f9a64f0a2ec5 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-22T01:12:04Z" service.beta.openshift.io/expiry: "2028-04-22T01:12:04Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 44104a21-cf6a-47e9-9e08-7746e53f6e9d creationTimestamp: "2026-04-23T01:12:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"44104a21-cf6a-47e9-9e08-7746e53f6e9d"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-23T01:12:05Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 44104a21-cf6a-47e9-9e08-7746e53f6e9d resourceVersion: "7707" uid: 4b9d7bf6-4203-4a31-b1f9-5cb323e7061e type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-23T01:06:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"953f85ca-0d4d-4659-b86a-70580da9b760"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T01:06:12Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T01:42:40Z" name: dns-dockercfg-h4q4b namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 953f85ca-0d4d-4659-b86a-70580da9b760 resourceVersion: "44448" uid: 2816b0e9-2561-4fd0-896b-ce812ee7128b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-23T01:06:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"555d459a-4627-4526-b5c1-a42ce6399e64"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T01:06:12Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T01:42:40Z" name: node-resolver-dockercfg-bmzbz namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 555d459a-4627-4526-b5c1-a42ce6399e64 resourceVersion: "44535" uid: d2eca31b-5e4f-492b-a727-fb40eb518137 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "46370"