--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T14:20:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e479bc90-4ca2-4cc7-aef6-0378822d1101"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:56Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:56Z" name: builder-dockercfg-fmjz9 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: e479bc90-4ca2-4cc7-aef6-0378822d1101 resourceVersion: "25743" uid: c176b580-e8a2-47b8-bf5b-eecaf87a4e25 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T14:20:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4f42395a-355c-46a1-aae9-f725b0df63ae"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:51Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:51Z" name: default-dockercfg-jxg8s namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 4f42395a-355c-46a1-aae9-f725b0df63ae resourceVersion: "25603" uid: 4b48704c-1b2a-4082-93b3-eab8dd8459a2 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T14:20:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4d7c6bee-917e-4f92-8141-500562fa17c6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:56Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:56Z" name: deployer-dockercfg-jcsdh namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 4d7c6bee-917e-4f92-8141-500562fa17c6 resourceVersion: "25761" uid: b89d558b-a243-45bc-a96d-6a6392ceeb3d type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T14:24:24Z" service.beta.openshift.io/expiry: "2028-04-23T14:24:24Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: cf06c130-a6a3-4620-94ad-c0ec25fe3fbc creationTimestamp: "2026-04-24T14:24:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"cf06c130-a6a3-4620-94ad-c0ec25fe3fbc"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T14:24:25Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: cf06c130-a6a3-4620-94ad-c0ec25fe3fbc resourceVersion: "6751" uid: 8cc9fc37-206b-4c7f-9126-b8fafda0d62b type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-24T14:20:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"db1c3097-59e5-4300-a892-def94113fb3b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:51Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:51Z" name: dns-dockercfg-vrfmr namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: db1c3097-59e5-4300-a892-def94113fb3b resourceVersion: "25582" uid: bbff3011-bf93-44b6-88dd-be1747d95807 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-24T14:20:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"874b5152-238b-41b5-b5d1-63b996f5e993"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:51Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:51Z" name: node-resolver-dockercfg-pmznq namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 874b5152-238b-41b5-b5d1-63b996f5e993 resourceVersion: "25591" uid: ab7644a8-a3a2-4d65-83f7-4482938ccfbd type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "41709"