--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T17:21:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c6be7aaa-0567-4689-a671-36b82f89deab"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:21:57Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:57:57Z" name: builder-dockercfg-ztr45 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: c6be7aaa-0567-4689-a671-36b82f89deab resourceVersion: "26252" uid: 1e7d6536-4a65-4e4c-8027-2067fd40dec9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T17:21:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e46136e6-1baa-4251-a840-0831e0aecddc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:21:51Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:57:52Z" name: default-dockercfg-44qm4 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: e46136e6-1baa-4251-a840-0831e0aecddc resourceVersion: "26068" uid: 1c2d7505-6f60-4273-af22-e8968471bb48 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T17:21:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ca05bf94-4a1a-48c9-8b31-28fb29a9883f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:21:57Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:57:57Z" name: deployer-dockercfg-cv5kc namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: ca05bf94-4a1a-48c9-8b31-28fb29a9883f resourceVersion: "26243" uid: e2ac49fe-e55f-479a-ba4b-a86d2db77d3b type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ1ekNDQXMrZ0F3SUJBZ0lJVE14MlR6VW5CbWt3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qUTBOamN4TnpBZQpGdzB5TmpBME1UY3hOekkxTWpGYUZ3MHlPREEwTVRZeE56STFNakphTUNneEpqQWtCZ05WQkFNVEhXUnVjeTFrClpXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXVjM1pqTUlJQklqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FROEEKTUlJQkNnS0NBUUVBejY5NGltbTJqU25rNWhoNDN6NkdWVFlWRXNMbTdxd2x6bU9kT0Q0NnRicmFhRHdUcFZxMgpRb0paWHRueWVmd201UUhJZWlmZXU3azI0NWVQUFNmVUZNV3dvWVlhL0NXZVdUWThtaGRUdUYyWDlWQ3hqTktOClpHeTIwV2NxSlJ4TUNZVjU3cGs4QkNnMFphZE55SDh1T2xmTlJCTXBvQUFNMDFyZlJmSGpYSGpVKzhqSll6SkIKbWRLOC9IWlpJT09LKzJUMUhhOXpaOXZ2dlBzODU4Ym1YTXRGN2liWkxUcTNEa0FtRE5jdjVIa0xBZHAwZXdwTAo4YmEvRkNhMkJ5eVFId0FFTkx6M2NDWEF1TUhqZHVmdnYvcXZNaTNPSXowcE10VkIzYTVxOStWb3JRTkZqS1ZrCmV3T1FIYjE1U3ZyVm5BaVRvSlBvWmoydTUrbkVheWhpcndJREFRQUJvNElCQlRDQ0FRRXdEZ1lEVlIwUEFRSC8KQkFRREFnV2dNQk1HQTFVZEpRUU1NQW9HQ0NzR0FRVUZCd01CTUF3R0ExVWRFd0VCL3dRQ01BQXdIUVlEVlIwTwpCQllFRkNrSXl4N1RFM0JTcEZVKzFueERtT1drZlhHdU1COEdBMVVkSXdRWU1CYUFGRlNKbFo2WWtRdjVtSmtUCmdkRG1kSlNkVUNMSE1GVUdBMVVkRVFST01FeUNIV1J1Y3kxa1pXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXUKYzNaamdpdGtibk10WkdWbVlYVnNkQzV2Y0dWdWMyaHBablF0Wkc1ekxuTjJZeTVqYkhWemRHVnlMbXh2WTJGcwpNRFVHQ3lzR0FRUUJrZ2dSWkFJQkJDWVRKR00wWkdSallXSmxMV00zWkRVdE5HUXlOeTFpT1RkaExXVXpabVkxClkyRXlabVU0T0RBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVQvMm1JR2xOV0FDUTVnT2FEeGpIeWxTcDdDZkEKNG91YmQwMzQzQVlsZitsOXZBMzVTZmt0R3F0c1d1blB6YW9ldzMzNkpIOVJGeFF2L0pjaHh5NVJybGx0V01aSgpCakNFUmVCOWVvamVJT3loTExMbW96OUdFMTRES3ZacnhTZXdud2hzYXpXdG1na2t1OGJxL2dWWVpRcTJzYyt6ClhrdU1Ybi9XRkNWZWZ2SXZMY1RsTjl6K3o0eDd4d1BWbTFFT1Fzby9JblVxYXkwSVRZQUtLTXRxdmhRRWpXOGwKQ2FiYUNDMDFpTkRFUkFROU9ORHVaaU1sTTlTL1NJTi9SS2xyZzVnWUNuWjVMcE1PcllVRGNzSkQ1REhzSitQcwpteWczMTZycEc4NmMvYjkxTXFxajhZQXF2eGRrTnByam9BQXJsdU9xNWk4MjlLb2hJaEJuWFJwTnJ3PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlUVXp4TmxMa0RaY3dEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpRME5qY3hOekFlCkZ3MHlOakEwTVRjeE56STFNVGRhRncweU9EQTJNVFV4TnpJMU1UaGFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTBORFkzTVRjd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFDcFhqbU9kYkNLZm9rS2ZSM2xERFArTWx5NW1NN092b3hBCk5aM3huNUdIdFRsc2JjbGRYSXQrZG5OcnE1WHorUE53ejJVNGJ6NUJxL1NmSEh3SEVZVERWNU9lVzJCSnQ0Si8Kd2dNTHNtNDJXWDJSQ1IvVXpDYXNyVXBVTTZSMzRtbHpQejZEVVNFY3BJR3ozMTd4MVl6ZmdHZTRjTVprMVRneQo4Z0RLSHQ1cE1qM2xobkhZZnNuYjlDK3pQeXJqdUJ2QjIzd2l0dXUxY3VOcUYyQ2FpMnFPckdudzBvd1d6Kzk4CnZEcmF1TVpnSTNaYU9WYXdiN0l6SU1zd2o4TXlrZnBUZEpYZmRLKzJJQVlJbWw3NWNtakI2MDFSNTVTcHltTksKTkhOTGROZ2UxeGh1ejFZcXpLd0RWQm1FSXVXMzhCMytWQzc1Q0tFeDZFemlwVDAxaGt4ZEFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUlVpWldlCm1KRUwrWmlaRTRIUTVuU1VuVkFpeHpBZkJnTlZIU01FR0RBV2dCUlVpWldlbUpFTCtaaVpFNEhRNW5TVW5WQWkKeHpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWcrakMwUlFCWnNhUjlBSnpNOTlqa2dZTmNxc3ZaUjcxdkFXNgptWk1DRXVhM1ZKVGlUb29UbzdPM2pSMjNxZ01zQUM0ekpOeFJMZHpKNXdaNXhpMEdUQS9IcDUyV0FRY0V3NU56CllwcHplWGNBVkFJQ3JKaTZJUm9kNmk3ZDIxMnJ6ZTg3NTByaTRva0RUMFo4bHBnMzRmaXRDM3FyRDk5ZWJQOHgKZlZ0Unlid0RzcUgxdjAwdm91dm80MzhTU0RvdTJ1N3I3eXFyVkdNMEhIRTVlVjFKYlFIckFzWDNvSngvbEY1RwpaZW5vT3pYYUd0ZDdVeUtoSlJRb3dGY05MUkRQK1VLcTBQSm44c0VaRlJFd0FrUjFCSUoyR2s2SGFNYlE3ZWpjCmdGYlN2MHZzQ1U1NVcwb1htYnl6ZlpZZHU3QXNoaElYTE1qT0lla2NVbjFra1NCM0pBPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T17:25:22Z" service.beta.openshift.io/expiry: "2028-04-16T17:25:22Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: c4ddcabe-c7d5-4d27-b97a-e3ff5ca2fe88 creationTimestamp: "2026-04-17T17:25:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"c4ddcabe-c7d5-4d27-b97a-e3ff5ca2fe88"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T17:25:23Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: c4ddcabe-c7d5-4d27-b97a-e3ff5ca2fe88 resourceVersion: "6871" uid: ccae90ae-fc81-4bf1-9b72-a67649545998 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-17T17:21:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"afec25fd-87d4-4b64-b8fe-b14f044a3b4e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:21:51Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:57:52Z" name: dns-dockercfg-9l5w8 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: afec25fd-87d4-4b64-b8fe-b14f044a3b4e resourceVersion: "26076" uid: 8a4e1089-df6b-45d8-ae73-f34e53fc239a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-17T17:21:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6d5808c0-835a-4e3a-829f-44ac1be6bf3f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:21:51Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:57:52Z" name: node-resolver-dockercfg-zpnn2 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 6d5808c0-835a-4e3a-829f-44ac1be6bf3f resourceVersion: "26066" uid: 90247a1a-c721-4b90-9159-36942184d654 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "41931"