--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T16:35:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6ce171fe-1389-40cc-9c50-a3a2f4b95b54"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T16:35:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T17:11:43Z" name: builder-dockercfg-pd57l namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 6ce171fe-1389-40cc-9c50-a3a2f4b95b54 resourceVersion: "25165" uid: 15daaa8b-a53d-4957-bb6e-6226d9148764 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T16:35:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5210e6af-919b-42f4-b0fa-7c41d4dc0f77"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T16:35:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T17:11:42Z" name: default-dockercfg-7pql8 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 5210e6af-919b-42f4-b0fa-7c41d4dc0f77 resourceVersion: "25045" uid: ed04fa9b-5ecc-4381-9796-58bba3314d39 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T16:35:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d559bffc-4efa-47ef-a64e-5bbf7e6c2cf3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T16:35:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T17:11:43Z" name: deployer-dockercfg-5j4n2 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: d559bffc-4efa-47ef-a64e-5bbf7e6c2cf3 resourceVersion: "25167" uid: 608e72bc-28a5-4723-9da9-549b3900c56d type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ1ekNDQXMrZ0F3SUJBZ0lJSHg4NnJMMENFYkV3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM056QTBPRGczTnpBZQpGdzB5TmpBME1qUXhOalF4TWpOYUZ3MHlPREEwTWpNeE5qUXhNalJhTUNneEpqQWtCZ05WQkFNVEhXUnVjeTFrClpXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXVjM1pqTUlJQklqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FROEEKTUlJQkNnS0NBUUVBMjlYdVU1bXN4SVFLeHFjTHZ2dHA3YXVEbFlqRFE2N1VuUXVZeVhJa3JDNllqYW5IZ1h6SApyMkdrdnJyMFQyZzJUOWNJZlk4azRQZ3dJdDFpZHhYVFRObnkrR2hVbndiZGJqN05LbFQvRHFZdXU4amtkUk5TClo1eWphM0lmT3RMdTQ3eTBUWGtjYXhFS2VoZHdoaWwyN0U2Yk4yOUM1alRwRDNlUDZOc3JWOHhIdndVOGk1akcKMXZENitybzJZZm9uajgzcVA4ZXg3eVZWb1lKK3RlaXR6bmlMalRERU11MTFibFQ0ZXMzeGZsaHpKM1F6OTg2YQpYVUYrSEFtVkU0RjdnOUxsMEpRd3RtQVJJOUZKdE9lTzgwT3lrVVUrUzhZUDlZZWpkT3RZS2tEbFdtUFZRZ2dVCmJrTEliWXlMRTFUZHpiRkV4UmM4WXRXYkQzYnk3ZGQ3clFJREFRQUJvNElCQlRDQ0FRRXdEZ1lEVlIwUEFRSC8KQkFRREFnV2dNQk1HQTFVZEpRUU1NQW9HQ0NzR0FRVUZCd01CTUF3R0ExVWRFd0VCL3dRQ01BQXdIUVlEVlIwTwpCQllFRkVNTU91d1FpOURkVlZOVldmb0MxQjVvWEUrcE1COEdBMVVkSXdRWU1CYUFGSDFHcU5leTRUdEkvRmJjClM0UDQ5c09sT3QxdE1GVUdBMVVkRVFST01FeUNIV1J1Y3kxa1pXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXUKYzNaamdpdGtibk10WkdWbVlYVnNkQzV2Y0dWdWMyaHBablF0Wkc1ekxuTjJZeTVqYkhWemRHVnlMbXh2WTJGcwpNRFVHQ3lzR0FRUUJrZ2dSWkFJQkJDWVRKR001WWpSak5qRmlMVGxrTmpRdE5ESXpNUzFpWldOaUxUSXhOV0ZpClpHUXlNbVpsTVRBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQUNnREJOVWtmcEtXenY3RGNaZ3BnNkpZYnZBOGIKWTdwZDczYU5KN2lBZ2J1TlBrRlZVdHo1WFRwTW04OGJFeHhyTDZ2TlVKZy9UKy93MTRKYUxPT2p0TGNIT0JDWApoYVhvK2d5T1ZLOWxWK1pPL3hnRlUrRGwzbWFjdlV2ejJScVk3QUNiM21hT25reHp4QktlcWo1dDFWcUZGQ3BqCkFHWW1vWll2OHBMOUg1Ri9OdzlIbE5Iai9qd1puUm9vWm4zUTBLNHZJVFQ3eGgzNGFKZHMrUWU5QjFIa2FNMksKYTVhYUkycFJmV2JFd1hobVNPZTY4ZVlRb1IwRVdUTXNXTjZicjhqTldUMmU5N1FUcXBaUWo0SGJvVXJIRFpKaAo3TXNocG5acTl6M3o2V0JsR3VMblZaQStOT3VmMHFwY0JmQkFRb0hCK2FOV3BTTnhrZXl5WkQreWlBPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlLT0hSWUFHWS9sMHdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTnpBME9EZzNOekFlCkZ3MHlOakEwTWpReE5qUXhNVFphRncweU9EQTJNakl4TmpReE1UZGFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056Y3dORGc0Tnpjd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFEY0FiRWxYTDloRXAveFlwUk5oYWJrbzBkakc2Y1BJdVY4CnJhOU9HaUN5VjVTRWNoUEgrdVhCY2F3RTNFbzkxbVl0Zm53Q2tlTkVMSGt6V3FvNXdwZU9WUktadGQwUExrZHQKMkVOQkpmQXFEKzlpS1ljU0VYMTZhVllFWGFYdnF3ZjRQc2UyNFoxTVNkc1d3UnBtTys3ZG83Wks5UTRUaE5EYwpUNXhFQVRDRlFBeGNONEd0a2hWV0RMU1VkQVE4U3BzZUswek9YUVZ4VGJqanJ2K09ZTk9hYnU0bGpGWVBMSjl5ClhrSnlwdDlsbHFkaDRaQWVXTmZSWFJZYk5JeUJrZkpMT3IvdktOOGU3SytSY3FzM2JjelF4OVpoK1RRcDRrZC8Kb3o1eGp4Z2ZzaitlN0ozckV6ZXlrY3pOVS9ZZTdTdC9zOGZlQlJESEN1T0VGcVA1WjdkeEFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUjlScWpYCnN1RTdTUHhXM0V1RCtQYkRwVHJkYlRBZkJnTlZIU01FR0RBV2dCUjlScWpYc3VFN1NQeFczRXVEK1BiRHBUcmQKYlRBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQTFoMXVsSXhLa05tS25YckczaWpUOG43V0JXalVHNVphaGxqaQpWak1WdzVUbkgraStqNjltT1RXUGdrQ0RxNGRmSlg1MnpMN1Jkb2ErZWZZMDBIa1ZuVWtSODR0ZGJ3U3dkR1RlCnU5dUVjTDQ2N1R5bTVQbm9NUmhMb1pwd0xwYndZN2MrY0NNVE1Xb1p2NlNkUHlYazB5cUY2bkx1NTlTbzltcnUKL0tzbldPc0ZkaElyamR2N2hqeEl1bVFva04ybTRJelRZMjBkNUdKSFY5R2VuOHB3MFFac2RaWUJ4aXlRaTFwSApTZTZUaTZnaXYvL25pWTBxeGY3NWY2cEZhZDJLUUhnZUZGNis2UWE2bW1oSmp4N2JBTUQwaFVpOTZTS1Uwc1FmCkZKelNWU2xwZEZYeWRuYnZPeWJmMzVKVzgxdm4wY0pvTFo2MUV1TjFwcisrL08zVFlBPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T16:41:24Z" service.beta.openshift.io/expiry: "2028-04-23T16:41:24Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: c9b4c61b-9d64-4231-becb-215abdd22fe1 creationTimestamp: "2026-04-24T16:41:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"c9b4c61b-9d64-4231-becb-215abdd22fe1"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T16:41:25Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: c9b4c61b-9d64-4231-becb-215abdd22fe1 resourceVersion: "7824" uid: 38dc8f3a-a406-4548-884f-f974446d8e35 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxMiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-24T16:35:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e260359b-a3ad-43a4-845f-cf71c2c1b9cc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T16:35:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T17:11:42Z" name: dns-dockercfg-zzj8j namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: e260359b-a3ad-43a4-845f-cf71c2c1b9cc resourceVersion: "25052" uid: cd69616b-20e0-495d-97a2-afd6d37dd87a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-24T16:35:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bfe2532b-813d-4abf-b4dc-53f8de3fb1aa"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T16:35:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T17:11:42Z" name: node-resolver-dockercfg-mpw6l namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: bfe2532b-813d-4abf-b4dc-53f8de3fb1aa resourceVersion: "25046" uid: bc9c0576-d8e2-440c-bf50-16e75b1726e8 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "43178"