--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-21T10:00:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T10:00:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"12999b44-38cb-4547-a19c-a906729a1c72"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T10:00:32Z" name: builder-dockercfg-kck8h namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 12999b44-38cb-4547-a19c-a906729a1c72 resourceVersion: "3948" uid: eb9ff107-c575-44cc-b29f-05faaa155bff type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-21T10:00:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T10:00:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0775ade2-99f8-4dff-9e36-e7b688a796bc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T10:00:27Z" name: default-dockercfg-l9lp2 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 0775ade2-99f8-4dff-9e36-e7b688a796bc resourceVersion: "3363" uid: 20f1c22e-0923-4f9e-8012-147aa0eeeb50 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-21T10:00:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T10:00:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"25093304-6b0c-4ed0-8317-8302cbd4dfd5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T10:00:32Z" name: deployer-dockercfg-vl2c5 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 25093304-6b0c-4ed0-8317-8302cbd4dfd5 resourceVersion: "3952" uid: 781a6fec-2f91-4d05-abe5-c23ad037b20b type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T10:06:24Z" service.beta.openshift.io/expiry: "2028-04-20T10:06:24Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: f99273fa-c005-436a-9816-c1dd47dcc410 creationTimestamp: "2026-04-21T10:06:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"f99273fa-c005-436a-9816-c1dd47dcc410"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T10:06:25Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: f99273fa-c005-436a-9816-c1dd47dcc410 resourceVersion: "7945" uid: d8bfe5a1-1724-4e6e-a283-ccb297385d4e type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-21T10:00:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T10:00:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9c2677fb-5726-4c3c-90a1-b41a6375cd77"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T10:00:27Z" name: dns-dockercfg-g7j6z namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 9c2677fb-5726-4c3c-90a1-b41a6375cd77 resourceVersion: "3359" uid: d2de62e4-4f98-43b4-b585-965ba0e6eb80 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-21T10:00:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T10:00:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1e92a67b-c084-4ab9-aa00-ce4f844780d6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T10:00:27Z" name: node-resolver-dockercfg-qrxk4 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 1e92a67b-c084-4ab9-aa00-ce4f844780d6 resourceVersion: "3368" uid: 7017da20-cd50-4167-9e52-ac725bb7cfcb type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "25082"