--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T18:43:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"74fd56e7-ccc9-4261-b702-ac716dbd34ff"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:31Z" name: builder-dockercfg-sbh9n namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 74fd56e7-ccc9-4261-b702-ac716dbd34ff resourceVersion: "25570" uid: 79f653e2-6cb7-4819-816d-a3df2bb4ce16 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T18:43:26Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7a33d8da-772f-413c-aeb0-90a599d48a33"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:26Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:26Z" name: default-dockercfg-jdk4n namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 7a33d8da-772f-413c-aeb0-90a599d48a33 resourceVersion: "25396" uid: b79ece49-000e-4dcc-ae32-d5b3acd57a37 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T18:43:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fc2d863c-3513-4e37-baf0-0b2246b1ea37"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:31Z" name: deployer-dockercfg-4dhtf namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: fc2d863c-3513-4e37-baf0-0b2246b1ea37 resourceVersion: "25567" uid: 0f1033dc-7a5c-4e94-bff3-97fdc213b74f type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T18:49:10Z" service.beta.openshift.io/expiry: "2028-04-21T18:49:10Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: f0a558c5-1e90-48e8-bf98-15d53af13381 creationTimestamp: "2026-04-22T18:49:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"f0a558c5-1e90-48e8-bf98-15d53af13381"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T18:49:10Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: f0a558c5-1e90-48e8-bf98-15d53af13381 resourceVersion: "7718" uid: 9eeac705-1148-4a12-8de1-9c3e2aeb3396 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-22T18:43:26Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f51f8615-abea-4257-9653-8b68d4a01de5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:26Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:26Z" name: dns-dockercfg-w2ls6 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: f51f8615-abea-4257-9653-8b68d4a01de5 resourceVersion: "25393" uid: 060cc6b6-511d-44ee-ac93-0ab0fd1cac71 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-22T18:43:26Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d8f5ee48-4d51-4452-926c-b922453005f2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:26Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:26Z" name: node-resolver-dockercfg-lmkzb namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: d8f5ee48-4d51-4452-926c-b922453005f2 resourceVersion: "25397" uid: 9022a3b4-ea54-4ee9-8e3b-421ab23d617f type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "42510"