--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T16:35:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"87bc3720-1c89-4113-875e-8362a5b7eb88"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T16:35:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T16:35:50Z" name: builder-dockercfg-jlsbj namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 87bc3720-1c89-4113-875e-8362a5b7eb88 resourceVersion: "3961" uid: 8a17b413-faa6-4051-acb1-d50519d0d7c4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T16:35:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T16:35:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f685a013-f64b-4325-9bd4-7b9260a0d2a2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T16:35:44Z" name: default-dockercfg-thrf7 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: f685a013-f64b-4325-9bd4-7b9260a0d2a2 resourceVersion: "3373" uid: 2f31629b-96f3-4bdd-b52b-2250190e021f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T16:35:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"58582a06-20be-4586-8ae7-ec84ab9afbba"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T16:35:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T16:35:50Z" name: deployer-dockercfg-wxtdx namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 58582a06-20be-4586-8ae7-ec84ab9afbba resourceVersion: "3962" uid: abbbc5c6-3183-4b55-b617-57caaff23a2b type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ1ekNDQXMrZ0F3SUJBZ0lJT0pXN0N1eFRVZHN3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM056QTBPRGt3TXpBZQpGdzB5TmpBME1qUXhOalF4TkRkYUZ3MHlPREEwTWpNeE5qUXhORGhhTUNneEpqQWtCZ05WQkFNVEhXUnVjeTFrClpXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXVjM1pqTUlJQklqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FROEEKTUlJQkNnS0NBUUVBcHp3N201SlBDVGFmTzl0UCtXTkhNenowM0E3blhwcTVHbWdrclA5Mk5IeEQyK0ZtZS81ZgpCMEh2aW9oY1VOTE1XU3poZ0JjK1p1VFdyeXcxVXJYaEJZNDVVOUp2c3lTUWhqUnpRR1JmOThwb28zUFRqZFczCi95VGhGdGQ4TDNOR3pxdnp2Z2lkL0trS0Z1YmNHQmtVaVBwb1A2R1BRdVRXNGYzbkJHcVRMYm9YYzdOdGI3b3QKMUhOb0Zha3hwakoveUlPeVVmd3AzTWpxSVgrdDFEaWRvakV5dWhCUVY3ejMrNTBqeVZMNURDQTdNUTZ1OVdDOQpERmg3UllJbVZIRWZncnM5bkJoUWw2ZUYwUGFiNFFhS0tWVks3dTB2VDdQSFRNTXFGcnZHYnZmVVNib2NrSmxGCkE1dXl6cVB5QjRkOVcwK0NQQytoQ0QxZFUrUjFsZHl5blFJREFRQUJvNElCQlRDQ0FRRXdEZ1lEVlIwUEFRSC8KQkFRREFnV2dNQk1HQTFVZEpRUU1NQW9HQ0NzR0FRVUZCd01CTUF3R0ExVWRFd0VCL3dRQ01BQXdIUVlEVlIwTwpCQllFRkpqV2JoQzJpbHdJUi9IU0RaWnE5VEIrR1JGa01COEdBMVVkSXdRWU1CYUFGTGpBZ2t6WkE2WE1xQVpWCmwxYUxSQVB0cGNiSk1GVUdBMVVkRVFST01FeUNIV1J1Y3kxa1pXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXUKYzNaamdpdGtibk10WkdWbVlYVnNkQzV2Y0dWdWMyaHBablF0Wkc1ekxuTjJZeTVqYkhWemRHVnlMbXh2WTJGcwpNRFVHQ3lzR0FRUUJrZ2dSWkFJQkJDWVRKRE0yT1dNeE1USmhMVE15WkRZdE5ESTNaUzA1TmpJeUxUYzBPVFJpCk5qWTFPVGt5TnpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWtZeGRGR3VzSm90RnF5UGk5QXUwcjYwYmFVTkUKQ0lBNTJBM3ZIUW40Z2krT1pnUzZ2dnF4YVQzQksydzh4b1FsOFJpR0RmS25ONDQ2NmNmaG40WlZ3UndwY29DYQpqREVVM3pMaTVQU202OTY1Q1pJdXU5L2hKdVlaVHM5Tm4vQjRhTkxRRzdFUGZpY043dWJJUldEUjlDbkF4VHJICnIxS2dhc2VtNWdZb3VoTUhVbWx4TjZjNWdkMmxyQjZKY0xKZ2FPZjdQWHVJb2V6Wjl3cWVsL3dOeHFQNENWci8KQ0liMUxWYUtZNG5ha1Z3ZGNWd2pZY2NsbGRUQkFqNEVoWHpOUU55OWQ2WHAxbE1DeWJUMWk3M0FwZkNZalo4Mgo0NE1QRC9nbDI2Y1l1ajl3NkpScmtMYndWb0ZndFFvS2MyYUNlRlhkUjhUQU55ZitYTm0wS2tJY0NBPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlTNUJvb0wzTzRMQXdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTnpBME9Ea3dNekFlCkZ3MHlOakEwTWpReE5qUXhOREphRncweU9EQTJNakl4TmpReE5ETmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056Y3dORGc1TURNd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFETnJrditZV3lDSnNIZzJwcnJTakxZY2E3K2ZIVW84Q1RhCnF3M1pIckx3NDhVdlMraDUyZmRrMVFRd21xRkpKN1g4ZHVMMzB3dXpmZm9xcmowUmhPVmlQTzFjU3BsVVZjRFUKSkc0bUptNGtEdVNiMHRZUEdidUNBbW4ySXVjM0NmMGNoYU9NVkxmNTg3SUFRWU1mSTVtSXlOZERZNmlNMzBhYgprUndoVkN3dllZOHhuVndoZGNhTEIwazFTb3E4YTA2b2pQT1JxODRYZ3hDQ1hhMHRQb3VrS1JtVUthZnBxWVBmCk1rT2FuT09QVGM3dEtRYTFlZitNVDRVRFJLU1VvVXhSM3RpU3V5WmpsRW94SHpIVnlETkV6djJ3WG9IeFM1Q1kKRU9mRVpLUjdtcEpVWC9zMlljK3BOKzI2WFAyMlhsL2FwcVVqQ1JmRXJQZTYzT0hnZ2wyUkFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUzR3SUpNCjJRT2x6S2dHVlpkV2kwUUQ3YVhHeVRBZkJnTlZIU01FR0RBV2dCUzR3SUpNMlFPbHpLZ0dWWmRXaTBRRDdhWEcKeVRBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWF4b215RFNjS2NEMWJwc3UvUHJuYjVLTlEwRk9FZ0ZkaFluVgpIWEJ2bnFyek9kb1EwQVRUQ2phcGhKNHU5Y3ZoV3BrM0tWNWJwc3E5NGNyRGc5c3l2clo3R0s5SzdRSlVUNGhxClV3OElIeTBnWjFEQ3U2TGxEMzdBRGVHbEE1RzJmWHQ0b1hONWxXNWU2NEZuMGpDMFpldGM0RzdpZG5MVHBNdDEKSE4rVjhDUVlpTmVRNitOeFpLVGwxL2lqMzNYZGxDTURRVDZsRElqVXU4OTYxblRHOVM5eTRwTmNQSkF4YXJXUApiYy9IWXEvbFpndEZLdEN2TDloNFcwb1BFMlNRckRUMnMxdW0xTWlwWnlEbkpCR3NSWmFwODFGekNvNEF0bngrCnNBbFoxYU41a3l1dTBKNEYzYTRTQVRkN3NsTGQ4RFJtVjJscGVZWUMvTnhnSHA4aHlnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T16:41:48Z" service.beta.openshift.io/expiry: "2028-04-23T16:41:48Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 369c112a-32d6-427e-9622-7494b6659927 creationTimestamp: "2026-04-24T16:41:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"369c112a-32d6-427e-9622-7494b6659927"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T16:41:49Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 369c112a-32d6-427e-9622-7494b6659927 resourceVersion: "7482" uid: 892fe1c7-8cb9-4bdc-884e-b0660c77fe62 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-24T16:35:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T16:35:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c40b1d1c-ccd1-4450-9308-3ad44d573c5a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T16:35:44Z" name: dns-dockercfg-6n2jd namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: c40b1d1c-ccd1-4450-9308-3ad44d573c5a resourceVersion: "3346" uid: 0d600c27-fef2-442a-9559-85094a984ea4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-24T16:35:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T16:35:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4fbe7e74-8e51-48c6-adb8-bfe3db96a53d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T16:35:44Z" name: node-resolver-dockercfg-wwhfn namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 4fbe7e74-8e51-48c6-adb8-bfe3db96a53d resourceVersion: "3375" uid: 8aea4751-5380-4850-b0c2-e89474044957 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "15228"