--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-02-17T12:43:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-02-17T12:43:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d26d89e1-abcc-4a8e-bee5-ef8ec565a239"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-02-17T12:43:10Z" name: builder-dockercfg-njv7s namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: d26d89e1-abcc-4a8e-bee5-ef8ec565a239 resourceVersion: "4000" uid: ce1d1bc3-6307-464e-9794-4f67a0e0a1ab type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-02-17T12:43:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-02-17T12:43:05Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"17001081-d468-4166-af71-3eb4ced28c88"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-02-17T12:43:05Z" name: default-dockercfg-t6v6p namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 17001081-d468-4166-af71-3eb4ced28c88 resourceVersion: "3436" uid: a595c19f-5e2f-4c29-a663-f07a49e4d91d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-02-17T12:43:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3ea427ca-f83c-4fc7-8171-3d4cf136ac01"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-02-17T12:43:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-02-17T12:43:11Z" name: deployer-dockercfg-xbngx namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 3ea427ca-f83c-4fc7-8171-3d4cf136ac01 resourceVersion: "4010" uid: ec0b2164-2862-4488-80fe-6deba23a645b type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-02-17T12:49:02Z" service.beta.openshift.io/expiry: "2028-02-17T12:49:02Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 71e583a5-fdad-4c71-bc9d-77a1d0d88467 creationTimestamp: "2026-02-17T12:49:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"71e583a5-fdad-4c71-bc9d-77a1d0d88467"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-02-17T12:49:03Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 71e583a5-fdad-4c71-bc9d-77a1d0d88467 resourceVersion: "7931" uid: ee6483eb-813d-45dc-814d-08eb765c74c5 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-02-17T12:43:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-02-17T12:43:05Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2d3d897b-a3b6-49ed-a8ff-a75db2dfa7fc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-02-17T12:43:05Z" name: dns-dockercfg-944wh namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 2d3d897b-a3b6-49ed-a8ff-a75db2dfa7fc resourceVersion: "3439" uid: 6564ecfb-c9d3-44b6-b17c-05bdca403277 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-02-17T12:43:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-02-17T12:43:05Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5e3130cc-6228-4da8-9cfe-f96ee978c1c0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-02-17T12:43:05Z" name: node-resolver-dockercfg-rh78h namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 5e3130cc-6228-4da8-9cfe-f96ee978c1c0 resourceVersion: "3448" uid: 56a25a51-bb4a-4032-8829-1d2c5dbd8851 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "18901"