--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T17:50:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"48ffe846-c9ed-43c0-9ff9-3e408f3d669b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:50:21Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T17:50:22Z" name: builder-dockercfg-tl7bt namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 48ffe846-c9ed-43c0-9ff9-3e408f3d669b resourceVersion: "3695" uid: 585ed7dc-af62-485f-a697-e86a6f702970 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T17:50:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7137518d-0960-499b-b9f1-cb8b56eaee79"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:50:16Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T17:50:17Z" name: default-dockercfg-5q7ct namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 7137518d-0960-499b-b9f1-cb8b56eaee79 resourceVersion: "3073" uid: 9ba75bf2-2318-46be-8229-45530c883751 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T17:50:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5870335e-dc7c-473c-82c0-1c2c6a3ad26c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:50:21Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T17:50:22Z" name: deployer-dockercfg-zlgtk namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 5870335e-dc7c-473c-82c0-1c2c6a3ad26c resourceVersion: "3697" uid: b796281b-f745-4511-aaef-3acd26e8404e type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T17:53:49Z" service.beta.openshift.io/expiry: "2028-04-21T17:53:49Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 1b4fc6ed-8be0-44e8-ab50-8aee1754aa06 creationTimestamp: "2026-04-22T17:53:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"1b4fc6ed-8be0-44e8-ab50-8aee1754aa06"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T17:53:50Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 1b4fc6ed-8be0-44e8-ab50-8aee1754aa06 resourceVersion: "7059" uid: f16fcdf1-ce15-4abf-be5e-deb779fac53f type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-22T17:50:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"721d973d-d6e3-4bc9-b8da-75fbcc49dafa"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:50:16Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T17:50:17Z" name: dns-dockercfg-rhqnx namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 721d973d-d6e3-4bc9-b8da-75fbcc49dafa resourceVersion: "3075" uid: 9a3ac6c7-06c7-4481-ad77-74cedbcb740a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-22T17:50:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"eae055ed-d775-43ad-b10c-c1aefddc1d71"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:50:16Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T17:50:17Z" name: node-resolver-dockercfg-sg8sc namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: eae055ed-d775-43ad-b10c-c1aefddc1d71 resourceVersion: "3077" uid: 1cfa65cb-d79f-4ffa-913a-79f5429f6d59 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "37985"