--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T22:26:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"834bb585-87e9-451e-b4c5-c51faa816308"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T22:26:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T22:26:33Z" name: builder-dockercfg-wmxsv namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 834bb585-87e9-451e-b4c5-c51faa816308 resourceVersion: "4224" uid: fb93f573-5011-4c86-9b82-b7450e9f61fe type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T22:26:24Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"91e8f9a9-b60a-4ee4-a704-0aab010988ae"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T22:26:24Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T22:26:31Z" name: default-dockercfg-qtd9g namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 91e8f9a9-b60a-4ee4-a704-0aab010988ae resourceVersion: "3943" uid: 4aab677c-959d-457f-8619-b14270b2402c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T22:26:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7cf35403-52dd-4e11-a541-379cdd74315a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T22:26:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T22:26:33Z" name: deployer-dockercfg-cmmgp namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 7cf35403-52dd-4e11-a541-379cdd74315a resourceVersion: "4225" uid: ba4f0169-6022-4629-b021-14bc580ff74b type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T22:32:03Z" service.beta.openshift.io/expiry: "2028-04-23T22:32:03Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 20fe9ed8-f93d-4c46-992f-05bffcd86e08 creationTimestamp: "2026-04-24T22:32:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"20fe9ed8-f93d-4c46-992f-05bffcd86e08"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T22:32:04Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 20fe9ed8-f93d-4c46-992f-05bffcd86e08 resourceVersion: "7673" uid: dbcaec67-2d01-4648-a3a3-304e1643ef2e type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-24T22:26:24Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"43757456-bb0a-4f55-aef8-a660b3faee89"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T22:26:24Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T22:26:31Z" name: dns-dockercfg-svq4d namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 43757456-bb0a-4f55-aef8-a660b3faee89 resourceVersion: "3941" uid: b0e89ded-2521-4a28-97c5-3b8bffddf182 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-24T22:26:24Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8e8ad967-9325-458c-ba34-50f0aaba88aa"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T22:26:24Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T22:26:31Z" name: node-resolver-dockercfg-f8tbk namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 8e8ad967-9325-458c-ba34-50f0aaba88aa resourceVersion: "3944" uid: 18b66b5f-c32f-4485-adb9-d5b29a44cb49 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "24735"