--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T21:22:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3f82dfe1-6f8f-439f-995d-aaf1213d8ae5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:22:57Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:59:31Z" name: builder-dockercfg-4h2r2 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 3f82dfe1-6f8f-439f-995d-aaf1213d8ae5 resourceVersion: "25848" uid: 9159ba48-7d46-4b6d-8fc1-d1e38965f410 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T21:22:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"942b5662-d590-4fd3-b0c3-ed01b15223a7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:22:55Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:59:30Z" name: default-dockercfg-wl42b namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 942b5662-d590-4fd3-b0c3-ed01b15223a7 resourceVersion: "25759" uid: 45e5711a-bdd6-49df-9e85-954965ca09d9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T21:22:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"079877ca-1e16-4df4-9ce9-9518a5b83817"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:22:57Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:59:31Z" name: deployer-dockercfg-5bbgl namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 079877ca-1e16-4df4-9ce9-9518a5b83817 resourceVersion: "25894" uid: 90f8602d-a0c1-42cd-8f0e-7d2e004f40c4 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T21:29:06Z" service.beta.openshift.io/expiry: "2028-04-23T21:29:06Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 6f301bff-a107-4bfc-88e1-eae9d081f587 creationTimestamp: "2026-04-24T21:29:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"6f301bff-a107-4bfc-88e1-eae9d081f587"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T21:29:07Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 6f301bff-a107-4bfc-88e1-eae9d081f587 resourceVersion: "7802" uid: c4396172-3add-4ea6-a6ba-e3a02dbc61a3 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-24T21:22:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"de883233-1984-4737-b1e0-34080daa81e2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:22:55Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:59:30Z" name: dns-dockercfg-zkwd8 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: de883233-1984-4737-b1e0-34080daa81e2 resourceVersion: "25819" uid: 1623fadd-1101-41b1-8258-d1810314a030 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-24T21:22:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d1106d43-26ee-499d-b960-0c67620781f2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:22:55Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:59:30Z" name: node-resolver-dockercfg-84r2g namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: d1106d43-26ee-499d-b960-0c67620781f2 resourceVersion: "25820" uid: 5843e1ca-6112-4da2-b1bd-43e1441e4ded type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "42383"