--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-03-12T13:35:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"89467c0c-6a78-495c-acce-cc20e661dd32"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-12T13:35:21Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-12T13:35:28Z" name: builder-dockercfg-jtvzt namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 89467c0c-6a78-495c-acce-cc20e661dd32 resourceVersion: "4347" uid: 68559bc4-54f4-4851-a6dd-c67329d86570 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-03-12T13:35:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4a9559e9-63d0-47f0-8e0d-b5b24e6fca41"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-12T13:35:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-12T13:35:26Z" name: default-dockercfg-9p9mr namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 4a9559e9-63d0-47f0-8e0d-b5b24e6fca41 resourceVersion: "4094" uid: efb7a818-57ed-4ed4-872c-60a80dbe0c6d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-03-12T13:35:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"de354027-9816-497a-88f6-e34033adcd4c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-12T13:35:21Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-12T13:35:28Z" name: deployer-dockercfg-7fzfn namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: de354027-9816-497a-88f6-e34033adcd4c resourceVersion: "4348" uid: a5b47d95-97b5-4d23-a7bc-5957a690dfa6 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-03-11T13:38:43Z" service.beta.openshift.io/expiry: "2028-03-11T13:38:43Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 45c26732-9118-4d54-8b2b-711d8f409db6 creationTimestamp: "2026-03-12T13:38:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"45c26732-9118-4d54-8b2b-711d8f409db6"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-03-12T13:38:44Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 45c26732-9118-4d54-8b2b-711d8f409db6 resourceVersion: "6759" uid: dcd76fef-3939-404c-8760-43f309ccf3cb type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-03-12T13:35:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0068ad4f-5cfc-4bbd-acd0-678b1cd5de4b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-12T13:35:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-12T13:35:26Z" name: dns-dockercfg-4fw8j namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 0068ad4f-5cfc-4bbd-acd0-678b1cd5de4b resourceVersion: "4101" uid: 73c199b0-d27d-4fbd-8d9f-1ffe7d488832 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-03-12T13:35:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"be9835df-b453-46c2-a728-71860e31719e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-12T13:35:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-12T13:35:26Z" name: node-resolver-dockercfg-lmr5h namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: be9835df-b453-46c2-a728-71860e31719e resourceVersion: "4100" uid: e4f63f72-b618-4d32-8b36-3bfa16a02edb type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21966"