--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-23T17:50:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d6a836d8-21a9-4d7e-b771-b7dedc49ace1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:50:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T18:29:49Z" name: builder-dockercfg-nphnm namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: d6a836d8-21a9-4d7e-b771-b7dedc49ace1 resourceVersion: "27109" uid: b60cf253-1597-4de2-a030-101c7c0b1fbe type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-23T17:50:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e9f534c4-8103-4341-a222-f27a945f1ea4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:50:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T18:29:47Z" name: default-dockercfg-qmmkt namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: e9f534c4-8103-4341-a222-f27a945f1ea4 resourceVersion: "26896" uid: b124ad00-4ebb-40a7-af05-e141a04bb8ca type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-23T17:50:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"738aae57-c608-4ba6-bffd-a6f7daec9fe0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:50:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T18:29:49Z" name: deployer-dockercfg-bplfg namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 738aae57-c608-4ba6-bffd-a6f7daec9fe0 resourceVersion: "27071" uid: c3ce1f53-08c7-4d19-9362-d66241d76c00 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ1ekNDQXMrZ0F3SUJBZ0lJSlgxaXJnTlE4eFV3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qazJOamc1TnpBZQpGdzB5TmpBME1qTXhOelUxTURGYUZ3MHlPREEwTWpJeE56VTFNREphTUNneEpqQWtCZ05WQkFNVEhXUnVjeTFrClpXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXVjM1pqTUlJQklqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FROEEKTUlJQkNnS0NBUUVBeFhvak5yVEZtNUxMTlZHWEhqd2RLSG91ODVwb1gyb0RLN0VrYUlZTXBFVWdxd2lreGl3UwpLbXF2WmNLWmgxN0NNcjM2SkxRTVVJNXh1SlhDTGNxa3RFUzJDcW5qV1JSSE8zaENJemJwZHVKUW1WUFdNSkZwCjk3SHpBOW1Bak5QRVFERUdxWThQaEIyQ3oxSHlKWGtGMS9uSDdNV09VT2hvYXNDVE43YnVaVXBrR0dkNTR2S1kKQU9TdjErcEpHd0tSRDFxV201bEMyaUE1REk1cEIvb0RkSVdwVWlpYy91NFJmWXVOUUFzQ0lYbzltbU5nMDBXLwpLaWpQbWxKNStxalEva2o0elZlZXFOUkhtUjV2YU56RHFXS0VuVWNDMFNMbmova3R4YnU2U2dGMlV3alZSZWdZCkw3R0xzRU9FUUpJdWFQa1l5RUhPeU5NOFZ6QVBUam1WVHdJREFRQUJvNElCQlRDQ0FRRXdEZ1lEVlIwUEFRSC8KQkFRREFnV2dNQk1HQTFVZEpRUU1NQW9HQ0NzR0FRVUZCd01CTUF3R0ExVWRFd0VCL3dRQ01BQXdIUVlEVlIwTwpCQllFRkFGMy9nNHprUFFZZlpHRC8wYStETnBBN1V3NU1COEdBMVVkSXdRWU1CYUFGTUFSQklBMjVMUmVDU3d6CkFwUnBYMTk2NVUzQ01GVUdBMVVkRVFST01FeUNIV1J1Y3kxa1pXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXUKYzNaamdpdGtibk10WkdWbVlYVnNkQzV2Y0dWdWMyaHBablF0Wkc1ekxuTjJZeTVqYkhWemRHVnlMbXh2WTJGcwpNRFVHQ3lzR0FRUUJrZ2dSWkFJQkJDWVRKREpsT0dSaE1HVXpMV1ExTkdVdE5EWTJNaTFoWldNeUxUY3hOVFpsClptWXpaalJrWVRBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVJIR0JIS0xQVDdLN2h0OE80WEhVVEJJNmhjaHQKVnkzRnFEYTczaUZZbnA1MEl0R1djeEdCVWlIQW5vT0h0ZHYyZW00U0JHS1dkL21wdFlrMjBpY2ZZc2IxRHF4OQpIUnphdXJCWGN5dkhGOVRyUU5BMEJvOWR0S0JnaVJJUjU1U0hSb0J2MHl5Ykk4S2V2QVF6RmpIUTA1SFJ5RXk1CnlFVS9jckVBbjJPZVVOTlBmQUk5VWhRWTEvS21MdFlMWnExMjNCMURvZzdnNXM0N3Q0L0NBN2JBYlVFZHludTcKTjVlTHFycDNQVVVyeEVHUnFGWTBEakdvQW10b09lY2NCVGxwZmxEMkEwc0xMZER0U3I2bjdibW1YTmJSeW5FUwowLzhIUEdqK0hmaW9TRjNSRmZHb09rU24wRTFEQVEvS1l5Z3ZNUGlySElURGU4T04vNEFyOTQwekh3PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlKTHhSY2pHRmR2NHdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmprMk5qZzVOekFlCkZ3MHlOakEwTWpNeE56VTBOVFphRncweU9EQTJNakV4TnpVME5UZGFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTVOalk0T1Rjd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFESy8rSHord2lYSWtTbkFrUU84VWFiVFgzemZZWUYxdU5TCkdSQ3JabHMzWjhPaVRQMC9PUUpTV1lrVVNyOEwwUmNtVHpKaGNiakNPb0JDc09jYis5OGl2Z250RzNFaGhqME8KWnhha2FKcTUvMkpFMXhWelFpWWVpQUxwT1BUTEFVWnMrSElwR0cza1FxWG1VTm1Xc1ZZTldXbklYd2lQZXZjMgpRMFlIU1hQQXRmZ2Y0NTZuT3NDc29FODdlY1VsR3p2SzBRenZMK3dFWlpOcHFhNFhXV2d2bmtjMFIvaUFhTzRyCmFhTDJYcGN2Z2crY2ZuKzhFTDVvTW9nRGxGSkZwQksxNWFRSzU3eGh4aU9RazBnN3JEaG5UMmhVbU1wdW90Tk4KU1NIMW96M3JiQzdudFRuUWVha2MrbDhFS3BaN0ZSVlQxZDRScXhsU0tVUDQ0L1BoaFBXMUFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCVEFFUVNBCk51UzBYZ2tzTXdLVWFWOWZldVZOd2pBZkJnTlZIU01FR0RBV2dCVEFFUVNBTnVTMFhna3NNd0tVYVY5ZmV1Vk4Kd2pBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWRXVkNMRS9QNU9pOXRkR1MyMnFuTE9ydU42T1lDMkZFR2FSMgpUeGJkeU9QSnFSRHZ2VkZJWGhQcVRwcitGaWpsb1BBSWc4TTU1L1pFUUdXYzRQUDVuRE10WGlSeGxZUzMrdmpqCmNrdWNBQWFzUENDZmJBKzhzZ1V6WWlBVnpGUmpQZE5ORDIrMGFrbDY4akJpWDlPT2RML0hpNjYrTStpQit0VDgKTldPNW1CaWlWL2pBbW5QR1Z2WFYrc0hlYzdQdUpQdHlpdWZ5NVZCbTFiVUZDbk5DRW05K2s0Ukpiak1BZTZlYgpnUHpPbmg1dDNuaDVGSnp3RzV1Qm9UY3cvSngrK2NOSGoyd0JpQlJackYzTkh3WEJ4R0l4ajlOL0xxTVB4Rjk5ClhmU21LNUNLTzkxdnppczNwRnNuWG14azBVK2NudXRSUWkvT0RlMmM5Tmt2ZUljdlZnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-22T17:55:02Z" service.beta.openshift.io/expiry: "2028-04-22T17:55:02Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 2e8da0e3-d54e-4662-aec2-7156eff3f4da creationTimestamp: "2026-04-23T17:55:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"2e8da0e3-d54e-4662-aec2-7156eff3f4da"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-23T17:55:03Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 2e8da0e3-d54e-4662-aec2-7156eff3f4da resourceVersion: "6376" uid: 0879da2b-34eb-4d9c-b85a-c8990ebf0cb4 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-23T17:50:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3fd84136-91d1-4029-822a-b95a10464b13"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:50:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T18:29:47Z" name: dns-dockercfg-54wff namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 3fd84136-91d1-4029-822a-b95a10464b13 resourceVersion: "26994" uid: 674dd035-334a-4ebb-8e07-ef07f8801063 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-23T17:50:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a1cc145f-cfda-4db7-bdd9-acef1d0cafe1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T17:50:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T18:29:47Z" name: node-resolver-dockercfg-x8mkm namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: a1cc145f-cfda-4db7-bdd9-acef1d0cafe1 resourceVersion: "26970" uid: 84f9f372-e52b-4aad-8a83-6b1391cb470e type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "41749"