--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T11:26:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1b787520-0288-4a26-8fad-2cc3078b915d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:26:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:26:31Z" name: builder-dockercfg-xttd7 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 1b787520-0288-4a26-8fad-2cc3078b915d resourceVersion: "3672" uid: 6f34ccae-2a68-472c-a0c4-eb77f387e98a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T11:26:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ba27c9be-a611-4eb5-91f0-4783ee741ff2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:26:25Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:26:26Z" name: default-dockercfg-9w74t namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: ba27c9be-a611-4eb5-91f0-4783ee741ff2 resourceVersion: "3139" uid: 0581bc04-41c4-4431-b487-3128e508196c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T11:26:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8433b21b-5cc2-44a1-83a5-778560387f21"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:26:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:26:31Z" name: deployer-dockercfg-pp7nd namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 8433b21b-5cc2-44a1-83a5-778560387f21 resourceVersion: "3676" uid: a2e2bf88-9e15-4fa7-a3a7-96df48a63b0a type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T11:32:36Z" service.beta.openshift.io/expiry: "2028-04-16T11:32:36Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 17c4cf34-d4b4-41a4-9052-683fb338a4a7 creationTimestamp: "2026-04-17T11:32:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"17c4cf34-d4b4-41a4-9052-683fb338a4a7"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T11:32:37Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 17c4cf34-d4b4-41a4-9052-683fb338a4a7 resourceVersion: "7895" uid: 75851ba4-f121-49a6-b869-07740f671e2d type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-17T11:26:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"39d1f2be-470b-4ce1-97fd-a139ee36821b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:26:25Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:26:26Z" name: dns-dockercfg-ltml9 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 39d1f2be-470b-4ce1-97fd-a139ee36821b resourceVersion: "3141" uid: 9e0438bf-8486-43cc-9ab7-7a785d57c912 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-17T11:26:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"384bed62-4a40-433d-a920-e773ecec0e75"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T11:26:25Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T11:26:26Z" name: node-resolver-dockercfg-ptsrr namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 384bed62-4a40-433d-a920-e773ecec0e75 resourceVersion: "3142" uid: 176917f3-083a-4ea9-8d74-1681ada2f470 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "19336"