--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T13:28:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T13:28:23Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4ae2d5d5-3d42-4740-8c71-d6f40afcdc3d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T13:28:23Z" name: builder-dockercfg-j59xb namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 4ae2d5d5-3d42-4740-8c71-d6f40afcdc3d resourceVersion: "3822" uid: 1065395f-6594-4fe0-947b-5694481f9660 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T13:28:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T13:28:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0c78428e-19f5-4ad7-88fe-07e31fae5548"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T13:28:18Z" name: default-dockercfg-ht72s namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 0c78428e-19f5-4ad7-88fe-07e31fae5548 resourceVersion: "3205" uid: 68475894-1bc0-4d0e-bdf3-5d16424f91a9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T13:28:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"af234f3f-96c7-4e81-a892-fe64c829a6f1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T13:28:23Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T13:28:24Z" name: deployer-dockercfg-8jhmj namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: af234f3f-96c7-4e81-a892-fe64c829a6f1 resourceVersion: "3823" uid: 7d78e7b7-47e0-4391-b297-af6ebda93845 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T13:31:37Z" service.beta.openshift.io/expiry: "2028-04-19T13:31:37Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 5f5e6659-2e53-4715-a11a-97976d3eba8c creationTimestamp: "2026-04-20T13:31:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"5f5e6659-2e53-4715-a11a-97976d3eba8c"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T13:31:38Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 5f5e6659-2e53-4715-a11a-97976d3eba8c resourceVersion: "7006" uid: 7a41276e-a3ae-4377-82b4-d92139d7a859 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-20T13:28:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T13:28:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f4dc6ec1-def9-43c3-a00c-cdbb55cfb333"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T13:28:18Z" name: dns-dockercfg-c8wr5 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: f4dc6ec1-def9-43c3-a00c-cdbb55cfb333 resourceVersion: "3208" uid: 373ff424-a835-4ad3-ac1d-4a7e6bd94d1e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-20T13:28:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T13:28:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fd75e10d-eb52-4d95-8c45-a4aa427362d8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T13:28:18Z" name: node-resolver-dockercfg-d66cx namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: fd75e10d-eb52-4d95-8c45-a4aa427362d8 resourceVersion: "3213" uid: 2d846875-e257-48d3-8a0a-c9d9350e390c type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "40996"