--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T21:26:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"777be838-b55c-42e7-baf7-28cc5ec8433f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:26:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:26:28Z" name: builder-dockercfg-2fmz7 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 777be838-b55c-42e7-baf7-28cc5ec8433f resourceVersion: "4258" uid: 478d6052-e57a-4398-9889-ecb84dcbe760 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T21:26:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:26:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fff31576-2af0-4f0a-b061-7526a1374d89"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:26:22Z" name: default-dockercfg-z46mh namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: fff31576-2af0-4f0a-b061-7526a1374d89 resourceVersion: "3672" uid: 531c0e61-e2d3-4911-9f99-f426f34d0576 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T21:26:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"56ef77fd-038d-4d86-ba0f-73974f7ed7fd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:26:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:26:28Z" name: deployer-dockercfg-6zqlk namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 56ef77fd-038d-4d86-ba0f-73974f7ed7fd resourceVersion: "4257" uid: 0803b5a6-4389-4145-adf8-812b6819925a type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ1ekNDQXMrZ0F3SUJBZ0lJZFJBSnY4ZnBocDh3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM056QTJOakkzT0RBZQpGdzB5TmpBME1qUXlNVE14TWpOYUZ3MHlPREEwTWpNeU1UTXhNalJhTUNneEpqQWtCZ05WQkFNVEhXUnVjeTFrClpXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXVjM1pqTUlJQklqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FROEEKTUlJQkNnS0NBUUVBbmdnL0liTmtpT2hENENqU080OVlLQitxdStRUklYNFliTzl4ZHpzZ1BiOWcxYmFTYjk5Zwp4Q1BGTmx3MXY5dVZoQ21qejVQWmZhTXZ4MFFzTGk2eXlvZ1hMVjkwcmptVEYrYUQvWDUzTml4RUxJYms3eFhWClQzMVVOR3VMdWFvTTBjNVRMdUV3TXFPelNzS1ljc3lxVm5OL1JMOUFVTkI3bUl0ejhlRjUzWUw3TWVpQ2lwWDQKeTB1VjhOalVpZnZkUjk2bzBNTUdvbVA3UUZaSHV5bDFIa0hQeFdWVTVxWXJIajUzbEMwMG41S2NRZ0phaHNBQwowMDBXTDZiYlp3RVJTcENmODBRQU4vZHpQNjhKZEh0YkgvU1hkamxwL1ZXYll6T3Z1NlJyY0ozbnA3akRWNDZKCmx5ZkJpN09hVlV3ay9FNzZ0SzE4Q3BuOEJlVy9YbEpteHdJREFRQUJvNElCQlRDQ0FRRXdEZ1lEVlIwUEFRSC8KQkFRREFnV2dNQk1HQTFVZEpRUU1NQW9HQ0NzR0FRVUZCd01CTUF3R0ExVWRFd0VCL3dRQ01BQXdIUVlEVlIwTwpCQllFRkE1RktZWkJIRVl3RXd1eEczSVV4K0V0QjVLcE1COEdBMVVkSXdRWU1CYUFGTUZrak1iYURuYlc2WFhUCmZlQ3pTYW9hclRQSE1GVUdBMVVkRVFST01FeUNIV1J1Y3kxa1pXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXUKYzNaamdpdGtibk10WkdWbVlYVnNkQzV2Y0dWdWMyaHBablF0Wkc1ekxuTjJZeTVqYkhWemRHVnlMbXh2WTJGcwpNRFVHQ3lzR0FRUUJrZ2dSWkFJQkJDWVRKR1l3T1RjMVpqazJMVFUyWldVdE5HTmlPQzFpWW1SaUxUSmtOamN4ClpXRmxNMkkzTlRBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVlFLzI0QjNQSG5LTDQzZFhDV296YlRhRDMrMGQKZCtKT3d3K0hWN0V4UlNHK09EcTVmVHBNMHNCbFBXcWtiQzRYcEdpTW5EK1Q5QzFuMjhMZW1ycjJPVzFIWjEvRgp3SEY0emprTzV1bHFLZi8zVVo5NVozKzBBSGxCenhBOTFYc2RCNEJCbTF4WHE5K1J6U3hGbWxWUXJsb3BoUzRGCnZWT29zK2s4MnBIUW9MZFZFRTlycHdSc3UwNTljcGhWV3hLNGhlcnB0SkJ1SUxGT05MaURtbWFLSGdxLzk5SVQKZ1JjZzk2NGw5Z3B2OWZ5UDJaR2FnOFRPM3RGK1dqZjJGM0hlWWlSejkwdXBUcmcxYjRSaWVaalRQck5BNUxjRAp5d3B3aXR1RDlGUm9xNVJ1dG5TRHNNRFJmVEsyVDh4V1ZKMTNYeXpxSURqekRwcDduT00zbjhjQ0xBPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlEUFBvTnYzOUZwc3dEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTnpBMk5qSTNPREFlCkZ3MHlOakEwTWpReU1UTXhNVGhhRncweU9EQTJNakl5TVRNeE1UbGFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056Y3dOall5Tnpnd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFEREZpRGhueDNHZHhTeTg0akw4WURUdENVa2dZbDJqZ2g1CmZqMUNCdGFzYXkvR3c4OHBuR1VBTXdMb0tzVndPMyt3Wm9aWUhKalI1OE9GckhaUW5YRVVIWlh4WVArWVIrSlIKOUJuTElVZElaNlFqc3lpaVBrMmNBMFpyWFN5aWRZWUY5SmIxV1dldzZoMTFBOFZBL1dHNGNmV1A5MHc1OENvMQorV1RneUt1RllnR1Q1Vy8yNzFQeExZWGd1SFJ4RGNTQVBhemU4akJuTktORlJwSkVpWklKRjE2VHRMa0t5TW9aCmRtNkdOYnp2T1dHSnZ0RnVuTXI2TmZnSTRrUnNaWE9NSXF5WnJ3UTNFV3NBekxmbWUxcTM4ekFHNXE1aldjRjYKZi9qWiswOGlzZ25IN2FvaWFXb1dFT2R2RkJZZnpCSGlHbkk4c0dBRVlnaCtHelE2NlY0dEFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCVEJaSXpHCjJnNTIxdWwxMDMzZ3MwbXFHcTB6eHpBZkJnTlZIU01FR0RBV2dCVEJaSXpHMmc1MjF1bDEwMzNnczBtcUdxMHoKeHpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVgyZ2krU0dleVpyek5adlk5Ny9BQkV6YVNFL3Zyd1ZXZElOZQo4bG5jOEs3V2FMWnhXU2F6QU9aVmk0bzJINEk1REFTeXJNMnRYUFJPQzB5Z3lZL0Y1M2Q0ckpReFc4dWFnR2dCCi8ySEl5SjZRa2NkN3dJbTEyRkR6anhNWFFSYVhTR3NSM2pnOGhpYkxnTi9vK1E5YVdOb21BY1pIOVRhM1k5bEkKRkptQ0M3R2ptWTFvcWNMd0dSRThINGpUbWcvMVZHZzM2R1ViVmgvR3hWRndQemxqdGRjNlB4alNtZEZQTHc0UgphNmozbW9SVU4vdVl4SjBmNy9WcWc5ZDYyMFI2ZzdiWlgzVmZRVHZkd1dGTkZwcEoyejZXcS9MaG5XRklTaGt3CmcyN0F0R0ZHMUtPMktiSHZxUldTa1ZmUnYvTXFDSjlqdUpzUjJ4cG1ZblJpQTNsZmNBPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T21:31:24Z" service.beta.openshift.io/expiry: "2028-04-23T21:31:24Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: f0975f96-56ee-4cb8-bbdb-2d671eae3b75 creationTimestamp: "2026-04-24T21:31:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"f0975f96-56ee-4cb8-bbdb-2d671eae3b75"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T21:31:25Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: f0975f96-56ee-4cb8-bbdb-2d671eae3b75 resourceVersion: "7706" uid: f19421b6-551c-43ec-afff-cd0d6420b3f7 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-24T21:26:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:26:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c43ac89b-1304-4928-8013-572487a70c06"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:26:22Z" name: dns-dockercfg-sbjvw namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: c43ac89b-1304-4928-8013-572487a70c06 resourceVersion: "3686" uid: 3efdcea0-5e08-446c-9cec-96b7f73aa19c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-24T21:26:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:26:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d261db68-6f2b-4242-8a60-6f8284bd3648"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:26:22Z" name: node-resolver-dockercfg-pgp7d namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: d261db68-6f2b-4242-8a60-6f8284bd3648 resourceVersion: "3688" uid: d894d089-76c0-4ac0-b51b-f3bf2b0ac686 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21506"