--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-23T16:31:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1e602bac-e214-4c88-9540-1efdf92b6b19"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T16:31:41Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T17:07:41Z" name: builder-dockercfg-wghhb namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 1e602bac-e214-4c88-9540-1efdf92b6b19 resourceVersion: "26020" uid: 1aa407a0-dd9e-4b64-83a0-3fb0c00902c3 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-23T16:31:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a368098d-1097-42db-b8c8-a63db206a5a9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T16:31:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T17:07:36Z" name: default-dockercfg-n7hcr namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: a368098d-1097-42db-b8c8-a63db206a5a9 resourceVersion: "25844" uid: fefd97ef-4ce1-4679-b610-4a9cce93a71a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-23T16:31:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e79e254e-f1a3-492e-adfc-642ac66eda53"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T16:31:41Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T17:07:41Z" name: deployer-dockercfg-snlxz namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: e79e254e-f1a3-492e-adfc-642ac66eda53 resourceVersion: "26015" uid: 787e44a3-dd5f-42ad-a2d1-a4868047a5c3 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-22T16:37:26Z" service.beta.openshift.io/expiry: "2028-04-22T16:37:26Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 65a5f320-545e-4316-ad2e-7609cad4d703 creationTimestamp: "2026-04-23T16:37:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"65a5f320-545e-4316-ad2e-7609cad4d703"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-23T16:37:27Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 65a5f320-545e-4316-ad2e-7609cad4d703 resourceVersion: "7736" uid: 7302e5dc-04f3-4b7f-8efd-8291ab0274b7 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-23T16:31:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a470888e-0872-44e1-bd68-b7fe02217876"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T16:31:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T17:07:36Z" name: dns-dockercfg-jmk6t namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: a470888e-0872-44e1-bd68-b7fe02217876 resourceVersion: "25840" uid: 5288a7fa-0f31-4c8c-8721-7bc68f29cd68 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-23T16:31:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"10fcdea4-20d1-4ebc-9987-2fe1730a511b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T16:31:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T17:07:36Z" name: node-resolver-dockercfg-dwlr4 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 10fcdea4-20d1-4ebc-9987-2fe1730a511b resourceVersion: "25823" uid: 5ef08946-b2cd-4825-86bf-191703bf3464 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "33331"