--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-28T19:13:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e4e0f3d2-9503-4688-ac71-a8b4f3455a71"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-28T19:13:58Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-28T19:49:58Z" name: builder-dockercfg-2lbpj namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: e4e0f3d2-9503-4688-ac71-a8b4f3455a71 resourceVersion: "25034" uid: aca4319b-cb6c-4a4e-9799-8c420a44344c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-28T19:13:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1301550f-0d84-4bcb-8af0-66240a6ddd05"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-28T19:13:52Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-28T19:49:53Z" name: default-dockercfg-q4smh namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 1301550f-0d84-4bcb-8af0-66240a6ddd05 resourceVersion: "24875" uid: bf05a13f-660c-4d84-8e9a-b2664a56481c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-28T19:13:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7e488e07-642b-441a-adf0-10c665e23dff"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-28T19:13:58Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-28T19:49:58Z" name: deployer-dockercfg-gqh9v namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 7e488e07-642b-441a-adf0-10c665e23dff resourceVersion: "25049" uid: 3f1ae36e-b4de-46ab-b014-b92f58515e7e type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-27T19:19:02Z" service.beta.openshift.io/expiry: "2028-04-27T19:19:02Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: dd586199-7063-4bba-a7f0-8940afc4f546 creationTimestamp: "2026-04-28T19:19:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"dd586199-7063-4bba-a7f0-8940afc4f546"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-28T19:19:03Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: dd586199-7063-4bba-a7f0-8940afc4f546 resourceVersion: "7693" uid: fcbff030-e56c-4a94-b848-3a0a633e50f2 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-28T19:13:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"353216f4-d42c-4ecf-80bd-0f6c74147e17"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-28T19:13:52Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-28T19:49:53Z" name: dns-dockercfg-6qdcw namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 353216f4-d42c-4ecf-80bd-0f6c74147e17 resourceVersion: "24888" uid: 44a97768-f4be-492e-84e6-f9d4aa411d5f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-28T19:13:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2a81d008-9890-40b3-a385-7c660ed9e690"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-28T19:13:52Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-28T19:49:53Z" name: node-resolver-dockercfg-pvc6r namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 2a81d008-9890-40b3-a385-7c660ed9e690 resourceVersion: "24893" uid: eec024eb-e612-430c-8074-2f86bc5c3e02 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "33893"