--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T15:54:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"960975ab-7b7e-41f8-957e-0c9fa20cea9b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:54:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:54:33Z" name: builder-dockercfg-964ql namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 960975ab-7b7e-41f8-957e-0c9fa20cea9b resourceVersion: "4083" uid: 197aa965-5ff7-4d0a-ade4-39fb5481134b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T15:54:26Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c4637352-cbc8-452c-af5d-d840dcb83ad3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:54:26Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:54:30Z" name: default-dockercfg-7kqb5 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: c4637352-cbc8-452c-af5d-d840dcb83ad3 resourceVersion: "3702" uid: b74e4f7c-940d-4628-8336-4c7493bc8f4f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T15:54:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"49e9e655-04d8-45fd-b477-6e66427a7cbe"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:54:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:54:33Z" name: deployer-dockercfg-b54d5 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 49e9e655-04d8-45fd-b477-6e66427a7cbe resourceVersion: "4076" uid: bc738321-d0d5-45ec-b65a-c004240aaa5d type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T16:00:09Z" service.beta.openshift.io/expiry: "2028-04-21T16:00:09Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: ac565976-460c-4738-8820-5168e0a5bf31 creationTimestamp: "2026-04-22T16:00:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"ac565976-460c-4738-8820-5168e0a5bf31"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T16:00:10Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: ac565976-460c-4738-8820-5168e0a5bf31 resourceVersion: "7549" uid: 340d3e13-7850-43ac-b6f5-c8077cf183f1 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-22T15:54:26Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b1cc45a5-9e33-43b2-9296-bd4867fca1dc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:54:26Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:54:30Z" name: dns-dockercfg-lm8hj namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: b1cc45a5-9e33-43b2-9296-bd4867fca1dc resourceVersion: "3708" uid: dffb77e5-cc0e-4528-a8b4-e74d788dedd3 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-22T15:54:26Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"32d7f119-e280-461a-a14c-9d8f22fff8d3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:54:26Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:54:30Z" name: node-resolver-dockercfg-hfl9r namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 32d7f119-e280-461a-a14c-9d8f22fff8d3 resourceVersion: "3712" uid: ef936df2-1110-4cb9-9101-8b61886c6584 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "27045"