--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T18:43:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3185dcd5-1837-4da4-8baa-bb38e6f772f9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:43:16Z" name: builder-dockercfg-r6x2x namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 3185dcd5-1837-4da4-8baa-bb38e6f772f9 resourceVersion: "3785" uid: 6acbcb12-32d7-4e29-b54c-a581893aacb8 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T18:43:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b1a67cea-ddb8-4f44-8e5d-1ace854ad0d8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:43:11Z" name: default-dockercfg-gq9bw namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: b1a67cea-ddb8-4f44-8e5d-1ace854ad0d8 resourceVersion: "3189" uid: 06b38e96-f637-4fd9-aedc-29bf14726cd2 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T18:43:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9f867bb1-7271-47d9-ace7-622b3ee44178"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:43:16Z" name: deployer-dockercfg-xpx48 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 9f867bb1-7271-47d9-ace7-622b3ee44178 resourceVersion: "3784" uid: bbda4dbb-a616-45c8-b1d2-1b2b514afae5 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T18:46:46Z" service.beta.openshift.io/expiry: "2028-04-21T18:46:46Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 28bf6847-358d-46e8-92bc-2c4b1d97a8dd creationTimestamp: "2026-04-22T18:46:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"28bf6847-358d-46e8-92bc-2c4b1d97a8dd"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T18:46:47Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 28bf6847-358d-46e8-92bc-2c4b1d97a8dd resourceVersion: "7008" uid: e49e31d9-96ca-4dc2-958b-f247516b7f7d type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-22T18:43:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"66023b8b-3d56-43ee-b1fe-716048c09a59"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:43:11Z" name: dns-dockercfg-wnqbz namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 66023b8b-3d56-43ee-b1fe-716048c09a59 resourceVersion: "3190" uid: ecbd5c03-8e30-458a-b919-93b48a5d6728 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-22T18:43:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fc0d9f4d-bc67-4912-8a8d-450c3028ab6c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:43:11Z" name: node-resolver-dockercfg-sf2bc namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: fc0d9f4d-bc67-4912-8a8d-450c3028ab6c resourceVersion: "3192" uid: ad622ca7-93d7-429a-934b-edba5b219a0b type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "20854"