--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-03-18T16:40:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"de658386-680f-4e17-a5d5-dfb251eb290f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:40:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T16:40:09Z" name: builder-dockercfg-zqmwf namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: de658386-680f-4e17-a5d5-dfb251eb290f resourceVersion: "3502" uid: 1dce4065-ff16-4c5d-9ee4-46e847f80afd type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-03-18T16:40:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T16:40:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1a02369e-c32e-4b73-aac1-df7b63b71e31"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:40:04Z" name: default-dockercfg-g2l6n namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 1a02369e-c32e-4b73-aac1-df7b63b71e31 resourceVersion: "2719" uid: 45e1d053-3159-49cd-aedf-d78de9cfdebf type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-03-18T16:40:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4b9063be-3e33-43d3-a7e9-c2ac0873119f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:40:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T16:40:09Z" name: deployer-dockercfg-cchmh namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 4b9063be-3e33-43d3-a7e9-c2ac0873119f resourceVersion: "3517" uid: ce64b91b-51f3-43b0-93a3-601df5f8c314 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-03-17T16:44:17Z" service.beta.openshift.io/expiry: "2028-03-17T16:44:17Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: a177ebdb-7ea0-4e21-90f5-25d896928f52 creationTimestamp: "2026-03-18T16:44:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"a177ebdb-7ea0-4e21-90f5-25d896928f52"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-03-18T16:44:18Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: a177ebdb-7ea0-4e21-90f5-25d896928f52 resourceVersion: "7258" uid: a760b275-8905-4b34-beb8-9ed34517c22d type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-03-18T16:40:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T16:40:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1f0eb960-d902-4087-b645-e95be6433f02"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:40:04Z" name: dns-dockercfg-7bwt6 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 1f0eb960-d902-4087-b645-e95be6433f02 resourceVersion: "2723" uid: 9aa57d6a-746d-4674-aa8c-05a149021f62 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-03-18T16:40:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T16:40:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"54216ca3-48fd-4836-b672-103be6bc1553"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:40:04Z" name: node-resolver-dockercfg-84sd2 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 54216ca3-48fd-4836-b672-103be6bc1553 resourceVersion: "2727" uid: 360e14b8-0e24-4472-ab3f-3cbd6c951d3c type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21762"