--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T15:05:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c38b100f-2175-4481-98dc-e8c73b69b5af"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:05:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:41:34Z" name: builder-dockercfg-s4f22 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: c38b100f-2175-4481-98dc-e8c73b69b5af resourceVersion: "22387" uid: a06e3f03-9adc-4b5c-a64e-831e99d47c2f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T15:05:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5bba098f-7574-4c5d-8b98-e519d89019a2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:05:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:41:29Z" name: default-dockercfg-f52zd namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 5bba098f-7574-4c5d-8b98-e519d89019a2 resourceVersion: "22249" uid: eb8356e1-92da-4ffe-8b8b-21b755cb8e7b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T15:05:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"601288cb-2554-4d6e-9268-0c9f1ff0aa0b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:05:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:41:34Z" name: deployer-dockercfg-cxzjj namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 601288cb-2554-4d6e-9268-0c9f1ff0aa0b resourceVersion: "22385" uid: d118b3fe-1078-43a6-845c-6eed3bd5582e type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T15:08:33Z" service.beta.openshift.io/expiry: "2028-04-21T15:08:33Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 5fcb2493-fc46-4563-9c16-564ff36105cb creationTimestamp: "2026-04-22T15:08:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"5fcb2493-fc46-4563-9c16-564ff36105cb"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T15:08:34Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 5fcb2493-fc46-4563-9c16-564ff36105cb resourceVersion: "6598" uid: 66863590-bab1-479c-8fa3-58c05e3da23c type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-22T15:05:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"10d81fb2-a3b1-4d40-aa5f-fe9cfcbb8ab1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:05:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:41:29Z" name: dns-dockercfg-62nkc namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 10d81fb2-a3b1-4d40-aa5f-fe9cfcbb8ab1 resourceVersion: "22245" uid: 50d335f7-7243-4b82-9ba7-abb011796cb1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-22T15:05:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"190dea07-4cf0-40ee-8c07-a8902e4fc531"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:05:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:41:29Z" name: node-resolver-dockercfg-vrq7v namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 190dea07-4cf0-40ee-8c07-a8902e4fc531 resourceVersion: "22234" uid: 2cea2686-de8a-4627-9810-30df97cf11bc type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "27600"