--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T19:20:19Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1be80380-42df-4f7f-9c36-a1543ee2d0cd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:20:19Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:56:33Z" name: builder-dockercfg-4zshr namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 1be80380-42df-4f7f-9c36-a1543ee2d0cd resourceVersion: "26416" uid: a9378855-779f-4208-a5c3-62c7c297ef84 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T19:20:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"26ae6a36-76d5-4fd7-8d57-aae743767c3b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:20:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:56:31Z" name: default-dockercfg-626xl namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 26ae6a36-76d5-4fd7-8d57-aae743767c3b resourceVersion: "26193" uid: 66568a6e-a421-4995-81c0-884390cf68ad type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T19:20:19Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"407d24f1-b48a-4f78-a14a-edf8259505de"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:20:19Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:56:33Z" name: deployer-dockercfg-knrs5 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 407d24f1-b48a-4f78-a14a-edf8259505de resourceVersion: "26383" uid: 1c1c4a22-1f05-4e49-9b60-aaf0699477b1 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T19:24:11Z" service.beta.openshift.io/expiry: "2028-04-21T19:24:11Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 4211bd9a-49da-40ad-91b7-1ceb3d605da6 creationTimestamp: "2026-04-22T19:24:11Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"4211bd9a-49da-40ad-91b7-1ceb3d605da6"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T19:24:11Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 4211bd9a-49da-40ad-91b7-1ceb3d605da6 resourceVersion: "6959" uid: 6fb31f9e-2307-4dbf-887a-c9ba2e6f3b33 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-22T19:20:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"11d6cedc-db6e-4144-81df-e232c4cdc1ad"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:20:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:56:31Z" name: dns-dockercfg-bspvd namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 11d6cedc-db6e-4144-81df-e232c4cdc1ad resourceVersion: "26237" uid: f142212e-ce5c-40c1-9c0b-676f1886e2d3 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-22T19:20:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9066ae67-e24b-46cf-8dbb-769f5e428827"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:20:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:56:31Z" name: node-resolver-dockercfg-qgw28 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 9066ae67-e24b-46cf-8dbb-769f5e428827 resourceVersion: "26230" uid: 8a466c63-846f-4b4a-a2df-7cfe6056d93b type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "33065"