--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-23T13:28:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d219ab0e-e2c7-4f5c-a279-163b8421d906"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T13:28:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T13:28:43Z" name: builder-dockercfg-28wh5 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: d219ab0e-e2c7-4f5c-a279-163b8421d906 resourceVersion: "4277" uid: a68bff48-47dd-4b03-9c06-940a4910511e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-23T13:28:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T13:28:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3ead6c66-c01b-45a0-aced-b3c9a86dd262"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T13:28:37Z" name: default-dockercfg-66z2w namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 3ead6c66-c01b-45a0-aced-b3c9a86dd262 resourceVersion: "3697" uid: af32cebf-155c-41e2-8174-199c0178f4db type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-23T13:28:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2c8e667e-1a53-4d06-87d1-53bd79d03024"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T13:28:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T13:28:43Z" name: deployer-dockercfg-qfpsp namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 2c8e667e-1a53-4d06-87d1-53bd79d03024 resourceVersion: "4278" uid: 449701fb-7f13-4007-a0cb-f3601e50eb09 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-22T13:34:05Z" service.beta.openshift.io/expiry: "2028-04-22T13:34:05Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: fc58ab91-c337-485b-a0ed-9a6ae557edf2 creationTimestamp: "2026-04-23T13:34:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"fc58ab91-c337-485b-a0ed-9a6ae557edf2"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-23T13:34:06Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: fc58ab91-c337-485b-a0ed-9a6ae557edf2 resourceVersion: "7826" uid: 10c106d6-11a2-47e0-89de-4315a6bf6579 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-23T13:28:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T13:28:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"edd46fe0-646b-4552-a2c2-cb13c4012a02"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T13:28:37Z" name: dns-dockercfg-vtx8h namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: edd46fe0-646b-4552-a2c2-cb13c4012a02 resourceVersion: "3698" uid: d1574115-160b-487d-951d-af2760d239f9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-23T13:28:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T13:28:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6d039319-fb28-40d8-844b-a42db45dd7e2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T13:28:37Z" name: node-resolver-dockercfg-vk77b namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 6d039319-fb28-40d8-844b-a42db45dd7e2 resourceVersion: "3715" uid: b0a1cbaf-65e7-4e70-8f4a-c301f7b5179c type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21163"