--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T20:02:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c751ad30-2372-4e40-ab5e-4fa1263ec4c1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:02:56Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:02:57Z" name: builder-dockercfg-mvcd7 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: c751ad30-2372-4e40-ab5e-4fa1263ec4c1 resourceVersion: "4113" uid: 9735a657-5751-493f-a427-8b9f46f45167 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T20:02:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:02:51Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fc8ff0d3-11cd-4d70-a5b8-586cf6bb9fd3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:02:51Z" name: default-dockercfg-mvfbp namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: fc8ff0d3-11cd-4d70-a5b8-586cf6bb9fd3 resourceVersion: "3540" uid: 17085edf-49ce-4688-8e97-cb62465730e4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T20:02:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7583000c-529a-42c4-bb34-b9762155ce46"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:02:56Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:02:57Z" name: deployer-dockercfg-z9jfz namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 7583000c-529a-42c4-bb34-b9762155ce46 resourceVersion: "4112" uid: 51e59c0b-f80f-430d-bdd9-c730f113137e type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ1ekNDQXMrZ0F3SUJBZ0lJUHhKaUlDMDhGRGt3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qY3hOVFk1TmpBZQpGdzB5TmpBME1qQXlNREE0TWpGYUZ3MHlPREEwTVRreU1EQTRNakphTUNneEpqQWtCZ05WQkFNVEhXUnVjeTFrClpXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXVjM1pqTUlJQklqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FROEEKTUlJQkNnS0NBUUVBdVZmS0p1M0hwY2I1K0RiTjZFQW84aWRMNlJBOSs4bHB5cHd1VlRjODNKTmtXL0hBTHlpNQpOaURYeGRkVHZRdWxhNndINk9waGlKd3FEdjRCbDZLamJ1TWRaL3UvSlF6UmhKVENhV3NHRk5MSENBQkFCbk9JCk82WEhEQk9aaXNpWVFtb2pod1lSeG53b2RCVzdjQXJZZWtqeC9jb1Y5RzJvSG9odlJwakR4cGlwMEx2bklJMW4KVmc5L1lCalN0bnh6Q0t5VE5lWk9xYmNqcTVVbmJvci9MM0xQTzVBdjc1dnIyV05JZTlsaFowVUx1YWtYZkJxagpJMlZMRENKOTUrYzNTTDZIV3BhTVp2N29xNW9IcDM1Z0ZIRGlxRStaaEREalJUS09qeUNTN2VaMGhPRXVQWTZqCmdqVEhoYW9temlGcmp6TnQrVy94MjVVeXorOUJ4dmFrN3dJREFRQUJvNElCQlRDQ0FRRXdEZ1lEVlIwUEFRSC8KQkFRREFnV2dNQk1HQTFVZEpRUU1NQW9HQ0NzR0FRVUZCd01CTUF3R0ExVWRFd0VCL3dRQ01BQXdIUVlEVlIwTwpCQllFRkZJMGpyWWJmbVo4bkdZUFVwQUM5eVpyVUZIZk1COEdBMVVkSXdRWU1CYUFGT1BCd2tILzNkTkRpTkhvCnZJNkNpSVZiODJxQk1GVUdBMVVkRVFST01FeUNIV1J1Y3kxa1pXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXUKYzNaamdpdGtibk10WkdWbVlYVnNkQzV2Y0dWdWMyaHBablF0Wkc1ekxuTjJZeTVqYkhWemRHVnlMbXh2WTJGcwpNRFVHQ3lzR0FRUUJrZ2dSWkFJQkJDWVRKREEwWmprd05HTm1MVGd5TTJJdE5EZGhaaTFoTW1JMkxUVm1NVGs0CllUZzFNRGRoWlRBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWxMRmJJQ2hhaGg4UmpUd24xZW93anVyY2ZlWGQKUmpWWndQNThDWDFIWjc0blFwOVBhWHFqSU52YlZOZVBzd0d0S0V1YVFVVitFNnNDVnhZNlNNRldyZXBLeUNzSwpORGt0N2ZoVmdoVklMSUxUbFlFNXNYOEZnQ2doWUhkTklreWdsMG1YYmhoWFBDdGQ4Zm5KSTJ1QTVvS1dIZ2ZNCjlLeXBmSVRSQ1dGZFpYdkJ4bXVOZTVtNWdqTEFPNUF5VGgzY0tFbkFTSjVnTENxSVVtT0wyd0VMQzhmV1lMSUUKQzJNbm5mNk80ZHBCQ2JnL0VRS0lMa3dnSjREbGNLUXg0bm4rejVTUktWSDVkbjJsaFVQSnVlWWFQRFNXSHRVSwpwU2x4MFJGakJ0T0VERVg2ZWdPdGxJWG9laHA5NjZJUU5wUjErVFdqOFlReFpYNTdDZEwwZ2NGSFJRPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlOM2ZpZGE1Q01Jc3dEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpjeE5UWTVOakFlCkZ3MHlOakEwTWpBeU1EQTRNVFphRncweU9EQTJNVGd5TURBNE1UZGFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTNNVFUyT1RZd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFETC8xTlY1Q0JhTFM1SmVVendoQzRkZzIwYnQvS1FMMWRICmhJck1OTTd1TFU0YUtkcWNadHBTb0tTdERkVHpraFgweHV5VTI0NE5GNXRkNE1idlB4WityYW52b01OVlNGMWwKRVhoT1NVczV3eFRBcitkNzNnNlFmcXJxbTRqZFFmWmpqazBnQmZjY3FaZ2ZBemhuNHh6Tno5elpKRHl0RmtZcQplcWZUNlBVSEtLTFl0NnZVNE50a21ZeERiR0FUblNsbERoTzlSUVBVYUcyMDhEa0dBUmY0SmZXR1ZZZlYwZGJJCnk0TmxEZGg0VEhTN0ZuVnpFZHhxZUl2U1BKN3BRWWp3SXA4cXRhZVNEeFBta20wWWdoLzNDZUlrRzVJVmF6V2kKNTFabUE4VndJVTdmRnhPWmdQQjFQSS9vcmFpUDJKQ0xvdWRhWUZWTHhmTXRtK2grakd1N0FnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCVGp3Y0pCCi85M1RRNGpSNkx5T2dvaUZXL05xZ1RBZkJnTlZIU01FR0RBV2dCVGp3Y0pCLzkzVFE0alI2THlPZ29pRlcvTnEKZ1RBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVF5aUFXalJhSzZIZzdGM2dQemZOME5XZHlPTUNLQURROWZLYwp0TWpmZThmaXdsNXZQZmxXeWlsYnRTdm9UdTREdFJCdXcvN01uVEsxVzRxZWRacjlXazRQMmQ4SytscXNBdXRLCkNraGltaEliT3JLVjVULzdtK200Y3RLTFFweWIxZUhvUGNObjVOUGZjTTFmb0FJQlNlbEdKT1VSV1BwckNRTG0KeUZGMFdZS3FzQmFNbDlMYnpsbnNKbDhmL254YlgrTkpRbHJYTkRCYWZrT0RPclE0OGdDU0lwVWVUK0crcHV2UQpRbU1rK0hOSk1MZUpld1RYSTRnTmdWS21WRHBTNEJMaEtKZ2JsNDZ2aE9udjh5Uk1ZYXJoMlk1T0tqWkVkckM0CmhOOUpUQVROajA5Y3A4ZlZURmp3VCthb2pJa1I0aU5uc3NwQ1hFdVNjQXl2d3VyRVZnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T20:08:22Z" service.beta.openshift.io/expiry: "2028-04-19T20:08:22Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 04f904cf-823b-47af-a2b6-5f198a8507ae creationTimestamp: "2026-04-20T20:08:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"04f904cf-823b-47af-a2b6-5f198a8507ae"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T20:08:23Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 04f904cf-823b-47af-a2b6-5f198a8507ae resourceVersion: "7715" uid: b8766faa-9d55-4fc9-96ab-ead38c7ca870 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-20T20:02:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:02:51Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"18f21819-dffd-4030-aeb7-997783eda0a5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:02:51Z" name: dns-dockercfg-vhk8x namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 18f21819-dffd-4030-aeb7-997783eda0a5 resourceVersion: "3541" uid: 1a60274a-b9fc-466d-8bc1-e61468ee3988 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-20T20:02:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:02:51Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e02235c3-bb01-4621-a378-fdb932215a57"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:02:51Z" name: node-resolver-dockercfg-8zqck namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: e02235c3-bb01-4621-a378-fdb932215a57 resourceVersion: "3542" uid: bb122cdb-4cc0-46f6-9625-66d5a2f4fc76 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "20938"