--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T19:03:54Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T19:03:54Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"be7f1d69-8c62-4c11-9502-a82a5283dcad"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T19:03:54Z" name: builder-dockercfg-p45nx namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: be7f1d69-8c62-4c11-9502-a82a5283dcad resourceVersion: "3489" uid: da12b699-bc10-47a7-ad9f-9412be20c63f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T19:03:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T19:03:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c5e66965-5aaf-465c-b6ba-346a93039c9f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T19:03:49Z" name: default-dockercfg-7dbls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: c5e66965-5aaf-465c-b6ba-346a93039c9f resourceVersion: "2940" uid: ed7de36d-b3a0-48cf-8c2c-c34e91fed7a5 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T19:03:54Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T19:03:54Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"43285a8b-1f4d-47fd-ab30-fd8e44cee8c3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T19:03:54Z" name: deployer-dockercfg-57j8f namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 43285a8b-1f4d-47fd-ab30-fd8e44cee8c3 resourceVersion: "3507" uid: 75e273fe-6fc6-4500-be57-33550bc862f4 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T19:07:32Z" service.beta.openshift.io/expiry: "2028-04-23T19:07:32Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 193a351c-bf95-4d4f-979b-d94f3159855f creationTimestamp: "2026-04-24T19:07:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"193a351c-bf95-4d4f-979b-d94f3159855f"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T19:07:33Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 193a351c-bf95-4d4f-979b-d94f3159855f resourceVersion: "7208" uid: 39181a5d-e43a-41c6-8a63-2bc1329d28f0 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-24T19:03:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3716a0ab-edc2-4ad3-8c1f-937580159e0b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T19:03:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T19:03:50Z" name: dns-dockercfg-rh56f namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 3716a0ab-edc2-4ad3-8c1f-937580159e0b resourceVersion: "2943" uid: 95fd71da-dc3a-4faa-bb6e-4b79d4367550 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-24T19:03:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1f611a5d-1cc9-40d1-9094-8ea3ee83156f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T19:03:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T19:03:50Z" name: node-resolver-dockercfg-fpmcl namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 1f611a5d-1cc9-40d1-9094-8ea3ee83156f resourceVersion: "2945" uid: 20e7b9ba-a87a-491b-be80-007357b63673 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "20948"