--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-03-18T16:41:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T16:41:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"aa3faca3-c696-4cbd-9421-e87c93b1a3c5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:41:09Z" name: builder-dockercfg-hcmhm namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: aa3faca3-c696-4cbd-9421-e87c93b1a3c5 resourceVersion: "3771" uid: 0b61b741-8349-4b40-a737-93ef264c455b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-03-18T16:41:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7df5b79e-5c9a-4281-b7fd-bd80ae626d79"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:41:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T16:41:04Z" name: default-dockercfg-48mxx namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 7df5b79e-5c9a-4281-b7fd-bd80ae626d79 resourceVersion: "3155" uid: 975dcdfa-505d-40ef-9d2c-7aef9358e878 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-03-18T16:41:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T16:41:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"86352b70-501d-48fc-9d79-6830d944d745"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:41:09Z" name: deployer-dockercfg-2ljxv namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 86352b70-501d-48fc-9d79-6830d944d745 resourceVersion: "3775" uid: ab050dd2-50db-4562-8549-b7296b131515 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-03-17T16:47:00Z" service.beta.openshift.io/expiry: "2028-03-17T16:47:00Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 36751664-1ae5-407d-9ec5-6d89a9757754 creationTimestamp: "2026-03-18T16:47:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"36751664-1ae5-407d-9ec5-6d89a9757754"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-03-18T16:47:01Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 36751664-1ae5-407d-9ec5-6d89a9757754 resourceVersion: "6610" uid: 5dca695a-c7c0-4d17-a3d8-9fbbc6ae9264 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-03-18T16:41:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ff0d7eaf-3701-4ac8-98c6-1d7470263869"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:41:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T16:41:04Z" name: dns-dockercfg-wnp77 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: ff0d7eaf-3701-4ac8-98c6-1d7470263869 resourceVersion: "3156" uid: 86ed3039-e095-48d9-9ec2-a7ab4e124092 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-03-18T16:41:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T16:41:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5734b795-a233-4b4f-8e06-9df39437c2dc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:41:04Z" name: node-resolver-dockercfg-67h2l namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 5734b795-a233-4b4f-8e06-9df39437c2dc resourceVersion: "3157" uid: e5f0b160-c772-463e-b219-20610dce3623 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "19477"