--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-23T17:50:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"af35f8c7-beeb-4497-a75e-608feddb0b01"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:50:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T18:29:55Z" name: builder-dockercfg-cslbs namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: af35f8c7-beeb-4497-a75e-608feddb0b01 resourceVersion: "27598" uid: 9470e5e4-b9a7-4e1e-9b5d-6fbf1c88670a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-23T17:50:17Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"29d89679-09a8-4d52-9639-2906a73e6eeb"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:50:17Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T18:29:53Z" name: default-dockercfg-8v5rx namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 29d89679-09a8-4d52-9639-2906a73e6eeb resourceVersion: "27423" uid: 1fa6d8d8-f175-4b65-8d44-40749373d16a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-23T17:50:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fb10741c-71da-4df7-809d-220b7895b97c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:50:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T18:29:55Z" name: deployer-dockercfg-9jq78 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: fb10741c-71da-4df7-809d-220b7895b97c resourceVersion: "27567" uid: b3563ba0-93b9-4cfb-964c-f059dfbff356 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ1ekNDQXMrZ0F3SUJBZ0lJVW5vTmdMU1V6WmN3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qazJOamt3TWpBZQpGdzB5TmpBME1qTXhOelUxTURkYUZ3MHlPREEwTWpJeE56VTFNRGhhTUNneEpqQWtCZ05WQkFNVEhXUnVjeTFrClpXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXVjM1pqTUlJQklqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FROEEKTUlJQkNnS0NBUUVBcnN5OGlqd05mODRZTzlLTFV1SS9mV3Nuanh5WGFOaXJKN3RHNkp1WGtuOExId1N1M25SSApnRnBvdDFuUzFzZldmZnNycWRxclB2U09wL2Y5c1lYc0Fva3U0aTZ6NUNmZ3REd1M2QXp5WmtqR3lDSjA2cVZOCjdJSzdaRmNLMjRRV0pKSFJtakd0eW9qU3J2LzdTMWhFS0JjZTJndlpwS2IzODIxZUtWVEU5UjNQRGJiek1YUUMKMjIwT3p2QkpsTFowYkNHVmVOYWNaTFB1bWZCay9IenB6YjJMSVFpUmlrTHRZSTVwb21WNndSMWdheTBDZEpkZQpHTlRYUEZLL0s2Yi9Jdjc5TWNRNGpwejBRdnBXSzNpZVl2QlRkN1IvVE1MdjlucXovNXlWTk4ydGdBVDA1a2NJCmFsT2h4ZlVISDRzR3kwc1NnT0VSNGFQUlVkdHBzRExCS3dJREFRQUJvNElCQlRDQ0FRRXdEZ1lEVlIwUEFRSC8KQkFRREFnV2dNQk1HQTFVZEpRUU1NQW9HQ0NzR0FRVUZCd01CTUF3R0ExVWRFd0VCL3dRQ01BQXdIUVlEVlIwTwpCQllFRkY5SVl0TUJJZHF4eG9Mb0MxYU9QUmFJVVFacE1COEdBMVVkSXdRWU1CYUFGQVhWQUs4TTZTYmhJNUxYCjJZWmZpSnJnb3I0U01GVUdBMVVkRVFST01FeUNIV1J1Y3kxa1pXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXUKYzNaamdpdGtibk10WkdWbVlYVnNkQzV2Y0dWdWMyaHBablF0Wkc1ekxuTjJZeTVqYkhWemRHVnlMbXh2WTJGcwpNRFVHQ3lzR0FRUUJrZ2dSWkFJQkJDWVRKR1F5WkRGa01ERTNMV1EwT1RNdE5HTXpaQzFpTVRVd0xUTXdNek15Ck5HUTVOMlJqTlRBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVRKODdWdGx2elNMNVhKN3NPbDc1QnhpRzRlbzAKZllsT0VVY2lrOUhXWENPWDl1VWR5N2UxSGdMZDlaU2FTcUhmL0FsUnlRZ3Zvc3MxekxaQUJoc3hPNFRBYmpDawpScGlQUjZqdW9oYVNZOWcvUG90QmFKakE3VTFiNEI4eGx1WEVOVzJWMzdMSXZFYzRUTndKcnZ0bFRzaE1nNSt1CjRUZGorRUNnOGpJNUtGYndXK2R2WnRwaDNEbUtJdERxV1NBd01JaWN0ZUpHMHNITkE4aG9HMG1oWkZmSVgxN3UKdGoyR2wzNW1oQWtRWFZaMWttOVpIbHlBYkd0aG9GUkh4R2J0Z3FDY05kUXduQ3ZieHNReGUvWkVXa1JiUHFhcgpheW8rTndpUjFwWW50RnZacFhOSlJiMGJKYVNseXB2dVRBdUZmK1k3SDFreFFyZDUxSWZ0eUhaWllRPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlOaVJRQ052MXcwMHdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmprMk5qa3dNakFlCkZ3MHlOakEwTWpNeE56VTFNREphRncweU9EQTJNakV4TnpVMU1ETmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTVOalk1TURJd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFDNnM0d2t6U3RqdGE2WDd5ZC90WVB6dzU1ZWcweWR3R3VZCmxXY3NYTkFtbnpXQlFmVGNPL0JVMGFnNDZQSEtPM0lKMDZJdjltWFU1Y3RBOTJpaEszbE9rQVRwK3JPSWFrWWoKTVJDOUdPSzRlTnZuc0Jua3dwNnlCRllXNGNEb3V0WlR0MXFJZEJsNDNSeksxN2NwbS9IbXBUVHkvVEdLK3NrUApraWZvei8yWW9Tamp2cnZ1bENTSXoyTjdzQitmK3BiTUxIUFlDdWh3MzZVNU1JdXhvcEZUb21xMFdiWmhGQkErCm5DdUVVdnB6eHBIZTFwT3JXMjEzUXc0WVNmUnJlaWFtYURPK1A2UXIyNitVcGF4NFQ4VS9KV1AvaFdHekZrNDgKSXJiVHRzd3dlbUdWS05CZ1B3UHo4MllkZ3NkREYwenZ1WmZHbUl5ZkJLdURxWHE1STVxMUFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUUYxUUN2CkRPa200U09TMTltR1g0aWE0S0srRWpBZkJnTlZIU01FR0RBV2dCUUYxUUN2RE9rbTRTT1MxOW1HWDRpYTRLSysKRWpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQUEyTTdzNGtVdDRRQkpjbWpURDlWVDlDYlU1dGIzdEY4dk9qVwpYb0NwRXAvNm4rZlJtL0RueG1aVkZ3UndvVENFVE93TzA4MXBNS0xaTGd5enpmSnlwbTFVUllWd1VpS1BqTHZQCkhVajhPYWpIL0NnY3UrUSt0ejFXUHVESmZ0SkU1ZEM3VTB3MlNUTzVrMVBEbzBpamplbmU4K252Q09ieWgvenMKMFRkM2d5UWU4TDJ4bjROWU9IdmNSaDFuQ2gxS3h2WTRxakhaUDBQUm1QenlLSWhkVDRVU1p4YW5aOFB3QWJrMgo4R0pBRy9FSFNDb3BObHF1UzdaQVdyZDlBY0FBWUR5cFdoczdWeEhEV0J4elVSZWhZWWRLK3NTaWYybFVJUDlWCnovK005NGRFL2ZTVFV2R3ZZTGJOcVRCS3VQZmtlbFljUkRlUjdGODI4YVVud1ZnZVJ3PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-22T17:55:08Z" service.beta.openshift.io/expiry: "2028-04-22T17:55:08Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: d2d1d017-d493-4c3d-b150-303324d97dc5 creationTimestamp: "2026-04-23T17:55:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"d2d1d017-d493-4c3d-b150-303324d97dc5"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-23T17:55:09Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: d2d1d017-d493-4c3d-b150-303324d97dc5 resourceVersion: "6592" uid: 197eb90d-1097-4a15-9037-ef8f2dae704a type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-23T17:50:17Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a2096d5f-f57f-4ad5-8e38-225ceefb8131"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:50:17Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T18:29:53Z" name: dns-dockercfg-jll6l namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: a2096d5f-f57f-4ad5-8e38-225ceefb8131 resourceVersion: "27371" uid: 7d73fefc-4378-4c46-ad45-303d19b48a23 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-23T17:50:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5c73308f-7cd3-4bf2-932d-9bee65daa8a3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:50:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T18:29:53Z" name: node-resolver-dockercfg-vlpfs namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 5c73308f-7cd3-4bf2-932d-9bee65daa8a3 resourceVersion: "27422" uid: ab22ad30-3c47-4c55-ab4f-3f7843f8d3eb type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "32572"