--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T19:54:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:54:41Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b205afcb-afbb-4050-88a4-72522eb59683"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:54:41Z" name: builder-dockercfg-9b4dv namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: b205afcb-afbb-4050-88a4-72522eb59683 resourceVersion: "3543" uid: a4b54c5a-67fe-4359-8a54-cf1d91ff7075 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T19:54:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:54:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"129aa9ee-ce5f-480a-b09a-c585fbe94515"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:54:36Z" name: default-dockercfg-kn284 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 129aa9ee-ce5f-480a-b09a-c585fbe94515 resourceVersion: "2757" uid: 3a8cb659-ddd0-4bee-a928-76df9d107d15 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T19:54:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:54:41Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"97680368-cf49-4657-88b1-c69b263ef613"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:54:41Z" name: deployer-dockercfg-bhk22 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 97680368-cf49-4657-88b1-c69b263ef613 resourceVersion: "3539" uid: 5d1038dc-9d47-4316-b7f7-138ff94fb6ca type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T19:58:43Z" service.beta.openshift.io/expiry: "2028-04-21T19:58:43Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 960ac77d-eed2-4e1f-b37a-709be9f47f9b creationTimestamp: "2026-04-22T19:58:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"960ac77d-eed2-4e1f-b37a-709be9f47f9b"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T19:58:44Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 960ac77d-eed2-4e1f-b37a-709be9f47f9b resourceVersion: "7330" uid: bd36b361-f19b-481b-91c7-c574a1eeecf7 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-22T19:54:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:54:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"94a83090-27f3-4255-9df8-9974173d7a51"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:54:36Z" name: dns-dockercfg-wrr4x namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 94a83090-27f3-4255-9df8-9974173d7a51 resourceVersion: "2765" uid: 906c31b7-5327-401c-a42a-bcee9f371f09 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-22T19:54:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:54:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c3301b12-1cc6-4824-8c32-f1911a494630"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:54:36Z" name: node-resolver-dockercfg-4fjn6 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: c3301b12-1cc6-4824-8c32-f1911a494630 resourceVersion: "2775" uid: bba44906-9401-49cc-a62c-8981db3ec051 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "37114"