--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T18:43:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:43:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b466cba2-6554-4d43-96d7-15ea0ac562ae"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:04Z" name: builder-dockercfg-sbwmc namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: b466cba2-6554-4d43-96d7-15ea0ac562ae resourceVersion: "3971" uid: d58506b9-9b72-4799-bf12-7cd12f09455f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T18:42:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6746aa9a-717c-40b7-abc2-5afe2e0ead4f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:42:58Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:42:59Z" name: default-dockercfg-bbtjh namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 6746aa9a-717c-40b7-abc2-5afe2e0ead4f resourceVersion: "3361" uid: 3fdeb93f-c2c7-4033-b7b1-9fdf45a9cbaf type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T18:43:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:43:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c8ef905b-0738-4373-8538-2b07f0ec80ba"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:04Z" name: deployer-dockercfg-7lc2j namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: c8ef905b-0738-4373-8538-2b07f0ec80ba resourceVersion: "3975" uid: 32caadd7-8ab8-41d8-88d2-5aece7c85a8d type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T18:49:03Z" service.beta.openshift.io/expiry: "2028-04-21T18:49:03Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 4af9dde8-8aaa-4b8f-902e-04c94201b5b8 creationTimestamp: "2026-04-22T18:49:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"4af9dde8-8aaa-4b8f-902e-04c94201b5b8"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T18:49:04Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 4af9dde8-8aaa-4b8f-902e-04c94201b5b8 resourceVersion: "7893" uid: 992b69c5-348a-4abc-a061-c31bfc557b28 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-22T18:42:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e5524559-a417-4783-b9e8-a2e762a6e77f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:42:58Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:42:59Z" name: dns-dockercfg-zg5rc namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: e5524559-a417-4783-b9e8-a2e762a6e77f resourceVersion: "3367" uid: 7bde3f71-bc86-4989-b8ea-5e753d395cb5 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-22T18:42:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"88f02c01-d2bd-47be-824c-aa4e68bce87c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:42:58Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:42:59Z" name: node-resolver-dockercfg-bnk4n namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 88f02c01-d2bd-47be-824c-aa4e68bce87c resourceVersion: "3370" uid: e7c5b184-3aa3-44de-a765-cacbf4a3f26b type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "37339"