--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T21:08:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"824469f9-dad7-427d-ae43-d3952a93a6b0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T21:08:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T21:45:11Z" name: builder-dockercfg-kxgqt namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 824469f9-dad7-427d-ae43-d3952a93a6b0 resourceVersion: "45475" uid: e3988510-8e9e-4281-bb4b-ef20239d4995 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T21:08:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ced82b4a-abd6-411e-9c33-42f1cb1013bd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T21:08:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T21:45:09Z" name: default-dockercfg-8dhsv namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: ced82b4a-abd6-411e-9c33-42f1cb1013bd resourceVersion: "45280" uid: ff8f521c-0ac8-42b6-b058-094fb781073f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T21:08:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c166dcee-db6a-435e-b3a9-4202ec56bfef"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T21:08:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T21:45:11Z" name: deployer-dockercfg-ws8j9 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: c166dcee-db6a-435e-b3a9-4202ec56bfef resourceVersion: "45532" uid: 43459c4f-aff4-40cc-ac62-155db524563a type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T21:14:20Z" service.beta.openshift.io/expiry: "2028-04-19T21:14:20Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 6bd7bfbc-9d02-4853-8298-2584cd0c6203 creationTimestamp: "2026-04-20T21:14:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"6bd7bfbc-9d02-4853-8298-2584cd0c6203"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T21:14:21Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 6bd7bfbc-9d02-4853-8298-2584cd0c6203 resourceVersion: "7603" uid: 072bfc37-4fd3-4fce-a0e9-cd2798ba8066 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-20T21:08:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8f8d61f0-3264-47cb-be05-d586c98170ad"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T21:08:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T21:45:09Z" name: dns-dockercfg-vtslr namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 8f8d61f0-3264-47cb-be05-d586c98170ad resourceVersion: "45257" uid: 7c9f8cc1-8d67-4816-853c-d59672ff94b4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-20T21:08:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7695ef19-ff60-4aa4-9b43-1a7637ed8cb3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T21:08:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T21:45:09Z" name: node-resolver-dockercfg-s7f2k namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 7695ef19-ff60-4aa4-9b43-1a7637ed8cb3 resourceVersion: "45264" uid: 56d1e602-e9de-48e1-a72e-4cffb4adaab7 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "47523"