--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T19:17:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"99c9e2fe-45bb-4d3f-ad87-80520ef10214"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T19:17:13Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T19:53:13Z" name: builder-dockercfg-8rz8v namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 99c9e2fe-45bb-4d3f-ad87-80520ef10214 resourceVersion: "42713" uid: 40ceb2a5-b53d-47f6-be0a-6355cd142fb4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T19:17:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"44f92099-b093-4d58-bd13-394aa37b1196"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T19:17:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T19:53:09Z" name: default-dockercfg-79tqz namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 44f92099-b093-4d58-bd13-394aa37b1196 resourceVersion: "42534" uid: 8f8fe122-dde4-4ee5-94d8-715cdc71c39e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T19:17:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"178c9e05-7aa3-4f29-9fb7-339c13c88ffa"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T19:17:13Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T19:53:13Z" name: deployer-dockercfg-wsg6b namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 178c9e05-7aa3-4f29-9fb7-339c13c88ffa resourceVersion: "42707" uid: ff2c5f03-105b-4df3-ab28-8dc5b10f4bfc type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T19:23:04Z" service.beta.openshift.io/expiry: "2028-04-19T19:23:04Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 4bc0d6c8-a724-4ce4-8ff9-5973e73c35bf creationTimestamp: "2026-04-20T19:23:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"4bc0d6c8-a724-4ce4-8ff9-5973e73c35bf"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T19:23:05Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 4bc0d6c8-a724-4ce4-8ff9-5973e73c35bf resourceVersion: "7687" uid: e88d4546-5ce5-4f50-9fa2-f3abe57f4a30 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-20T19:17:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ba319912-ef3d-4b77-9c66-19a5b078b3a0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T19:17:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T19:53:09Z" name: dns-dockercfg-qtv7w namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: ba319912-ef3d-4b77-9c66-19a5b078b3a0 resourceVersion: "42523" uid: cf9f9e18-1c65-4df5-940c-de27594d2e7f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-20T19:17:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6cb751a6-851a-4172-84e1-31113e6e31e9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T19:17:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T19:53:09Z" name: node-resolver-dockercfg-sqxxc namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 6cb751a6-851a-4172-84e1-31113e6e31e9 resourceVersion: "42547" uid: 1ba2d3db-74d0-46cd-89b4-23bd9d0e9f76 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "47171"