--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T14:49:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3838398b-d4ec-4825-9dc8-35c0fffa7aa2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:34Z" name: builder-dockercfg-hb4hn namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 3838398b-d4ec-4825-9dc8-35c0fffa7aa2 resourceVersion: "38224" uid: cdf9016d-5a87-48d0-872a-805482adb3e0 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T14:49:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ef6f85f7-7a8c-4299-8674-bc211c719710"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:29Z" name: default-dockercfg-zcgsr namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: ef6f85f7-7a8c-4299-8674-bc211c719710 resourceVersion: "37902" uid: bc237682-a1f2-44d3-a7dc-a80d1437c51e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T14:49:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f688953b-2bc7-47da-a0fb-695132ac4183"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:34Z" name: deployer-dockercfg-tqx72 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: f688953b-2bc7-47da-a0fb-695132ac4183 resourceVersion: "38221" uid: 160140dd-d665-4193-9371-36768b20f4aa type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ1ekNDQXMrZ0F3SUJBZ0lJY3I4M2IzTmVGYTh3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qTTFNVE13TmpBZQpGdzB5TmpBME1UWXhORFUxTURsYUZ3MHlPREEwTVRVeE5EVTFNVEJhTUNneEpqQWtCZ05WQkFNVEhXUnVjeTFrClpXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXVjM1pqTUlJQklqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FROEEKTUlJQkNnS0NBUUVBNHgrelgvcVBKSit6eEN2R3FuTlI5bjNxZk5FejFJWTRzODY5bFlWcFJINTFFOW5vd01HTQpvSWpLaWpabHFUV2VSTWxpOUo1NzdBVHBSOUFKU3pWelozVDF6TUI4YmFhQjRjR1d3WkhMMHJmU2h0OWJpQk91CnZOc1VGa3FkYWdCclpkTWlmU25WK1NTeTNqUTk4a1VHMnRDOHBSRnQrTU4yNE5uUm9ZYUNYK0NJQ0dqc2FaVWgKdU9vbzJjTHlNQUtTL2I4eUwzNDJhTDBVY0dzb3EyZ1MzRXozVTNSVWVIdFYwQVVFbUo1UE40UUlObUo0aG5DegpTYlRyUDUvTHhmanoya3Q1eEkvaGZhd3hNcWpDbEtRMmRZZmV2UUcrT0UweW5OMklwaTYxNXh6NkdHZUNxc3VuCi9FbjRLOVBUU0k3RFlweisyYjJpcmV0VS9pb1JSK0l3MHdJREFRQUJvNElCQlRDQ0FRRXdEZ1lEVlIwUEFRSC8KQkFRREFnV2dNQk1HQTFVZEpRUU1NQW9HQ0NzR0FRVUZCd01CTUF3R0ExVWRFd0VCL3dRQ01BQXdIUVlEVlIwTwpCQllFRktxSy91ditrUmVXUE84TlRaaGhET2hnYS9wZU1COEdBMVVkSXdRWU1CYUFGSzAvcUtxR3FhTUp6TGYzCjlFYkVhWkhjS0xJTU1GVUdBMVVkRVFST01FeUNIV1J1Y3kxa1pXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXUKYzNaamdpdGtibk10WkdWbVlYVnNkQzV2Y0dWdWMyaHBablF0Wkc1ekxuTjJZeTVqYkhWemRHVnlMbXh2WTJGcwpNRFVHQ3lzR0FRUUJrZ2dSWkFJQkJDWVRKR0ZrWm1FME1qVTFMVEZsTVdRdE5HRm1ZaTFpTURVekxXRmxOVFJoClltRXlNbUl6TlRBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQXl6MngzVERBWXdEOUxOWkt0ZTFZV08xcm9kakYKa0pWcmRJOUprU0NCSk1ITU85dkFvMkMyZGg5RllxQzNNZlNEd2FQM3VqUldzRmlaUTNyeUhKekp4NlFXcFltMQpDWTh2UUJPNEhrT0RRZXM0bXlrQ0VQSTlXOUM4dHRHRnUweGZjZmJpUVdPeXNpSzYxN0paREdrSWF6anpiRS84CnRNTVdWRnlsRmxWK2J0Zk84UlkrYUExb09sbTNOSy83VlBrcHVsQktQeW9MK0hFRG1kRWxxMmtpdXM4bVRmbVkKcmNYbDMwTitrVllUQVI1T1JmTUxiWkU3Z1BNS1llKzlRR2dhRHd4S1daNTFud0VoYjVPM1RvbWNsa1pLRG5jTApkMi9naWxoVmZhbk9oL0h3RWlMQ0hzdTVHRHZWUHhPVjlrS210ZllEQm5yTmw5NjlWZE9ZQVpRM3FnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlZcDB3MThYZC9Mb3dEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpNMU1UTXdOakFlCkZ3MHlOakEwTVRZeE5EVTFNRFZhRncweU9EQTJNVFF4TkRVMU1EWmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WXpOVEV6TURZd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFET2h1VE51TnJnTWd3aHpjMGZ6YmxCa2hZRnZkTVJXN25ICndvV2t6R2dyVE05WEtNRGZxeWhOanh6Z00vMXB4OFI4c3ZyUDdIQksvVnJrbk9PMHUySXhkRDJXNUcwNmRmVzIKcjBCTWkyRXM3Zlg3YTgrN0JwVjZUVGJ5TVdZVk1LZXgwd1hJU0ZqUytBRnFaUENaaDNaL2hSZEFWR245RzJMOQpxT283N3FPeUtzbzNLYWhvQ0FPRlE5OFU3bUVvbVljQ3pPc3dUbm9NMWFIWmprOWhuYWxKdUpCU2dqTmZOdUVuCmVVa2k3azk3MnFNUmNraytJRFhYaWJWUHBPTmVLalNPNitBeWVSMFhjYzRPRWtHM0VObmoxSHVNRk9HQTZUb1IKWmJmRi9EVFV1eUswNFE0YzdFZzVGZzQ1amtrZWJxWmt5K1hTNXZTRGkwTVNIeUUrU0pJOUFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCU3RQNmlxCmhxbWpDY3kzOS9SR3hHbVIzQ2l5RERBZkJnTlZIU01FR0RBV2dCU3RQNmlxaHFtakNjeTM5L1JHeEdtUjNDaXkKRERBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQW5EallYODU0WWJycEdaeHNWNXB2Y0hLcE44RUdkR0I0cjR4ZQpWWThLamRiSUkxTXo1bStrdnRDdHVqWGdPZ2c0aHZvZWxqMC9aQ3VqSmVRWTJxWVJZOFRwZktXdUI3b1RzOTZBCjU0R3c5SVNLUWIrNUFLNjJlQTZmUU1XamlrRVl3RXNSOVpkQ2dxTjdiaWE1Z0VOckZHbVlJT1EyeGtUR1k2WGcKYzZucU1WRlNCYTJOOU5qWC8wcnJvRzd5VVkvOFpWc1VTd2ZwSDREbllJb0xOazlaQnJsSFU3RHgzNzlCbzNOVgpnK3BiUXpRTVlFeE9zUUNkNjBvc3hnWGdHT05BTTFESzJVcG5ldXZWUUJ6WUZtUHJWZ3dpYUhoaTQvVjZTelU2CmpNcTMxQ2tXTFl0VFhKcW1vSkVLUzVRN2UrVzg2QUZvV1Z5blk5WFVlUnJEY2oyVXZ3PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T14:55:10Z" service.beta.openshift.io/expiry: "2028-04-15T14:55:10Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: adfa4255-1e1d-4afb-b053-ae54aba22b35 creationTimestamp: "2026-04-16T14:55:11Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"adfa4255-1e1d-4afb-b053-ae54aba22b35"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T14:55:11Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: adfa4255-1e1d-4afb-b053-ae54aba22b35 resourceVersion: "7763" uid: d95860d1-d18e-4e57-a857-aaf5d1ed8803 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-16T14:49:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fae569e7-22f3-40ba-9038-a719295df623"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:29Z" name: dns-dockercfg-nrznh namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: fae569e7-22f3-40ba-9038-a719295df623 resourceVersion: "37909" uid: 528899b3-7f7a-4306-ac1c-fb2b18966aea type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-16T14:49:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8ad71d7d-120e-480c-93c8-a55a376e7f6a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:29Z" name: node-resolver-dockercfg-nqc6k namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 8ad71d7d-120e-480c-93c8-a55a376e7f6a resourceVersion: "37897" uid: 3ff453f9-984f-474d-b509-d61d24a16704 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "38892"