--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T14:18:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"802b8b26-6cb4-4c16-a22f-4de323671ce1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:18:06Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:54:10Z" name: builder-dockercfg-2k5pl namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 802b8b26-6cb4-4c16-a22f-4de323671ce1 resourceVersion: "43246" uid: d52d2fae-6531-4c0f-9d0a-30d89caf9085 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T14:18:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"82463e87-fd42-46f2-9c62-02b76eff316a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:18:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:54:07Z" name: default-dockercfg-9x6wv namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 82463e87-fd42-46f2-9c62-02b76eff316a resourceVersion: "43095" uid: 15ef3101-4343-403b-81f5-ad29cfe9cb37 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T14:18:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"90e0b5d7-c980-4a14-b4c9-bfa574ce50c7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:18:06Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:54:10Z" name: deployer-dockercfg-sk7ms namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 90e0b5d7-c980-4a14-b4c9-bfa574ce50c7 resourceVersion: "43276" uid: de5cc3d3-ea17-41e4-806f-2e188e3bb606 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T14:23:28Z" service.beta.openshift.io/expiry: "2028-04-16T14:23:28Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: b5e978e6-1a13-493a-8a4d-81c6265b236a creationTimestamp: "2026-04-17T14:23:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"b5e978e6-1a13-493a-8a4d-81c6265b236a"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T14:23:29Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: b5e978e6-1a13-493a-8a4d-81c6265b236a resourceVersion: "7626" uid: 13608f3e-41b6-414d-a17e-f2b7fb0c3adc type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-17T14:18:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cf6cc4a0-5cf0-4ae9-9372-698b5565f4b4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:18:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:54:07Z" name: dns-dockercfg-rkhth namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: cf6cc4a0-5cf0-4ae9-9372-698b5565f4b4 resourceVersion: "43131" uid: ce0b30bd-c721-4cbd-98ae-9779ed44a098 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-17T14:18:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c7d10dd6-40c9-4fe4-aa37-2de1f808778f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:18:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:54:07Z" name: node-resolver-dockercfg-shpd6 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: c7d10dd6-40c9-4fe4-aa37-2de1f808778f resourceVersion: "43111" uid: 3a924d0e-4c12-48c2-96c0-d3548cfa0163 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "46112"