--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T18:14:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3a2b2115-4571-4f8f-9ada-a97fd2ff77c2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:14:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:50:23Z" name: builder-dockercfg-gc92h namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 3a2b2115-4571-4f8f-9ada-a97fd2ff77c2 resourceVersion: "26054" uid: 4c22fbc8-d7a4-4748-b889-d2c4766a8070 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T18:14:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"40bd29b9-42f5-4c65-b3e2-4c50741b400e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:14:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:50:19Z" name: default-dockercfg-4cscn namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 40bd29b9-42f5-4c65-b3e2-4c50741b400e resourceVersion: "25841" uid: ba541262-3a87-4fa5-9830-2279a90be3e2 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T18:14:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2b231408-f556-428e-bdd1-570e902d3403"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:14:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:50:23Z" name: deployer-dockercfg-ml69z namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 2b231408-f556-428e-bdd1-570e902d3403 resourceVersion: "26043" uid: 74bf90a9-b7c3-45bc-bf06-5870c4c2555e type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ1ekNDQXMrZ0F3SUJBZ0lJYWRzbTg5QkN2azR3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qTTJNell3TWpBZQpGdzB5TmpBME1UWXhPREl3TURaYUZ3MHlPREEwTVRVeE9ESXdNRGRhTUNneEpqQWtCZ05WQkFNVEhXUnVjeTFrClpXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXVjM1pqTUlJQklqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FROEEKTUlJQkNnS0NBUUVBcmlHbE40alJJVWRjRWY1VTNtWXdGU2dwYTZlbmlxUXdUTGw4THZNMFE0YmY1MGxTSjVrRApRa2YvQ3pOaGtyRTlOdFl6TTZib2dNbU9jR1Z6ZTFpUC8rSVZrbkhMZHBobndJMk9YMEZ1T25BT0pmWCsrSkZ1ClJQQ04vN09OL0NRQittdXNFZG44SnIrbGtld3RQaVVxSFhTNE9rRWFiTDNuZEtnTlRKczZuc1RvOGk1eStnL0IKUm4vazlWQ1ZKTVRsZER2OWRVelpCbVVpdzJVUDVSZTJYaDNMMnR2TTg1RElHMmZ2SCtoSitGY0h1NU03V2I4MwpQbStqS3g2U2YrMDVLb1ZURndyUUxxb01QdDA1RWZ6bnA2bFo5NE5kSmRYMjdBTlJCekN1RkVBaWljcSt3NWVwCmNTbHdYRHNBNDRUTk1OVldzWWR3c2Q4RXJzOHlqc3BodHdJREFRQUJvNElCQlRDQ0FRRXdEZ1lEVlIwUEFRSC8KQkFRREFnV2dNQk1HQTFVZEpRUU1NQW9HQ0NzR0FRVUZCd01CTUF3R0ExVWRFd0VCL3dRQ01BQXdIUVlEVlIwTwpCQllFRk5TUzdVZlA5NjBhZ0FYYk9uQjVIaWduQXllWE1COEdBMVVkSXdRWU1CYUFGUE42WWh3QXQxQVBHVW5NCjJKd3pEQVdGbmZ5SU1GVUdBMVVkRVFST01FeUNIV1J1Y3kxa1pXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXUKYzNaamdpdGtibk10WkdWbVlYVnNkQzV2Y0dWdWMyaHBablF0Wkc1ekxuTjJZeTVqYkhWemRHVnlMbXh2WTJGcwpNRFVHQ3lzR0FRUUJrZ2dSWkFJQkJDWVRKRFJqTVRVeE9EUXpMV0kzTW1ZdE5HTTVZUzFpTVdaaUxUZzRORGd3Ck5HUmpNVE5rTWpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVZxZFVJZEt6VjNMNjBQWUVyVDI2SVZLSkZlWEoKY01oWERxai9JZ25nMm1ocGw1aUYrS1dEaWM2b0s2U0QrT0phMGVnbFk0bFdsRnloc1Zla2RBUWFvaXMvQ1ZucwpIejJXdDdvbkRFbitEZ2ZmL0V2UjJ3bVlEbllYUEp6WGlUdjhGRmJEbmc3djRiV0RPUFBpMStzYU1MeWxnMDhGCmVqQWFGSFFiWUs2ekU1dU84L3ZMUGgvVmtCVSs4Z3FzejlxRVhUbHhKcS9MeEJYV1Q2Q3NMb1ZnVjEzaXVaSmsKMTdJMVdJSzkvaXFTeUZpOVNKeG9NNG43ckc2dWtvMFhqckpaUFliTEFSVzQzTms4K0RkZlQzbWMxZS9PY2R4VwpnQUFycDdCRUo2a3F5dkJzSUVHWnp5QzBQRzlSY3ltV1FHWVRHbTRJbzBjUmV5dVFYVDM5WE16YlF3PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlFeW94ZnV1cGZub3dEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpNMk16WXdNakFlCkZ3MHlOakEwTVRZeE9ESXdNREZhRncweU9EQTJNVFF4T0RJd01ESmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WXpOak0yTURJd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFDM3RtVFY1T1NGaUt3ajRnNUdCcldOSEVPT1c2U0xVZms4CkYrM2Qxak9UekFGZlRMQ2hNWkQ4THpJYlEwbXNaTTMvaXg0eFJxaW5qM2t5SEVhQSsxaWdiYllxUGJnd0U3OUgKOU8wRGVFOExrVmVJWkRjc0l0Y3pWUUlhSElOK2g1dGx5WTREbjBmYkhSNWZqdEViMWFuSVFyWVB4NHZIVDNGVApzc01BMlZxTzZkRFlBcDRYVUVZN0tUMXFFdFplLzQ0TzBUajJjUnFPTFh6UjlPbmNlZVoxT3ZYaWRmY3prSHN3CjU3dGphSHM4dnhiWXkwQUVDbHlVUC9JWCtxdFhJMTE4REN3RzBpNFphUjVxZEh2eElSVGhYdGkycDFvS2IxTTUKcERxM0RyM3oyZmtmTEQzYkd0NGZDcnhsUE1LbzJ4TUtZM0JtMERLSmxiT3prWmZOd0RyQkFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCVHplbUljCkFMZFFEeGxKek5pY013d0ZoWjM4aURBZkJnTlZIU01FR0RBV2dCVHplbUljQUxkUUR4bEp6TmljTXd3RmhaMzgKaURBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQW41SjkyYjhZdjNVM0RFWERTVDZMS0ZIMWdxZ3pzMDNOVlhZUQp2Vm1nN2RGVVBWeVlpOWxuRGNrSXF4ek8vclFXSTlsUjcvQUtKOWw2bWZrYkhGRFFoWVd1VW81VEFmSko5WHJTCkx6V2tGRk1ZdmtZSVp0a0NEWCtCUTBoWU5KdDVLUDQ3U2trYlR4Y25sekFsekFWOE5ISXRxWnpUemZrUmkrZGkKMjNkYTg1NFdWQVVKSGJvMHp1d2QrajlXdVFvSkNlK2MzbGJOOUFlSGVjSW1OY1BSVEdKUzZuVWx2NXFPWFZwUwpkcm94SjZjcWp0Q2Z4ZTJCZ0RuRnRCM01YVi9vSHgyK21WZ01TUTF4bDZobjhSVisxMkZLVi90a05hU2hrNk9yCjNIcjg5clQyZzBQVTVVZkhxRlQ5LzJZM3IrMmEzREVJbzFlNE9jUjJtREtxb0YzRTNnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T18:20:07Z" service.beta.openshift.io/expiry: "2028-04-15T18:20:07Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 4c151843-b72f-4c9a-b1fb-884804dc13d2 creationTimestamp: "2026-04-16T18:20:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"4c151843-b72f-4c9a-b1fb-884804dc13d2"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T18:20:08Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 4c151843-b72f-4c9a-b1fb-884804dc13d2 resourceVersion: "7743" uid: 56ebe7ad-1a39-46b5-b401-60999c16cd53 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-16T18:14:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a259cdfc-ab07-4948-9665-869151d8e473"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:14:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:50:19Z" name: dns-dockercfg-8xm9h namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: a259cdfc-ab07-4948-9665-869151d8e473 resourceVersion: "25839" uid: 4a34de06-3ef9-4117-918e-5c83b22bd18d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-16T18:14:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"146b35a2-e2d8-4589-b400-8c878bb4b5b8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:14:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:50:19Z" name: node-resolver-dockercfg-qhm2v namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 146b35a2-e2d8-4589-b400-8c878bb4b5b8 resourceVersion: "25868" uid: 4a07f717-3ab6-44dd-98c8-d055434f23e0 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "33106"