--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-21T17:30:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0bf1a243-9a79-45c7-b92e-ec5ad0d0513f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T17:30:21Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T18:06:21Z" name: builder-dockercfg-82nth namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 0bf1a243-9a79-45c7-b92e-ec5ad0d0513f resourceVersion: "43559" uid: dcf2633c-f85e-4dfc-8fc3-a50332c2de52 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-21T17:30:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7b7c7249-974c-4960-b20b-11e71a29f41f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T17:30:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T18:06:16Z" name: default-dockercfg-9qq4b namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 7b7c7249-974c-4960-b20b-11e71a29f41f resourceVersion: "43342" uid: c5cc8545-0610-4390-a7bd-d148ead32404 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-21T17:30:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cc940d35-3d31-4a2f-bf34-b10cad3545a3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T17:30:21Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T18:06:21Z" name: deployer-dockercfg-4ct4r namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: cc940d35-3d31-4a2f-bf34-b10cad3545a3 resourceVersion: "43560" uid: 2fb53e6b-45d3-4c01-8dad-ee5d75f918d5 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T17:36:00Z" service.beta.openshift.io/expiry: "2028-04-20T17:36:00Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: f00ea8a5-8026-47bc-a743-e6ba6de95cfb creationTimestamp: "2026-04-21T17:36:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"f00ea8a5-8026-47bc-a743-e6ba6de95cfb"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T17:36:01Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: f00ea8a5-8026-47bc-a743-e6ba6de95cfb resourceVersion: "7695" uid: cc9ae200-ec53-46ae-b1c3-1bc8ba24044f type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-21T17:30:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e68c8685-770a-42c6-80ea-d9575510671a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T17:30:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T18:06:16Z" name: dns-dockercfg-mlvk8 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: e68c8685-770a-42c6-80ea-d9575510671a resourceVersion: "43326" uid: 3bdf638f-3d0c-47c7-9766-823ff368206d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-21T17:30:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1ec456a5-ff2e-4d2b-a543-d7f8510fda1b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T17:30:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T18:06:16Z" name: node-resolver-dockercfg-nzsmm namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 1ec456a5-ff2e-4d2b-a543-d7f8510fda1b resourceVersion: "43335" uid: 98433465-e6cc-444f-b275-df0a9731078e type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "47348"