--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T22:26:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fa05e22a-a5c4-477b-8bd0-83d8b342a1ed"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T22:26:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T23:02:50Z" name: builder-dockercfg-l4496 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: fa05e22a-a5c4-477b-8bd0-83d8b342a1ed resourceVersion: "26235" uid: 13e57d7a-cc11-4498-8914-e2a779e0d534 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T22:26:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"76f6ad15-3b7d-485d-b7ba-e6be0fbf5f23"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T22:26:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T23:02:44Z" name: default-dockercfg-rdb6p namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 76f6ad15-3b7d-485d-b7ba-e6be0fbf5f23 resourceVersion: "26034" uid: f6bc6995-8134-4172-9525-d9cb30b6836f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T22:26:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1a335f79-e0c0-4407-a348-96b19d752521"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T22:26:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T23:02:50Z" name: deployer-dockercfg-9t9xl namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 1a335f79-e0c0-4407-a348-96b19d752521 resourceVersion: "26236" uid: 93bdb9c2-88a6-42a7-b28c-54b2e52632d7 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ1ekNDQXMrZ0F3SUJBZ0lJS1pRSlRrYTNnbnd3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM056QTJPVGswTURBZQpGdzB5TmpBME1qUXlNak15TWpWYUZ3MHlPREEwTWpNeU1qTXlNalphTUNneEpqQWtCZ05WQkFNVEhXUnVjeTFrClpXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXVjM1pqTUlJQklqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FROEEKTUlJQkNnS0NBUUVBOGpPUXp3NW1uQUhrQW8vRnlKWVRMMCtLbk8zV2d3VGFZNkY1M2hSL1U3eHNnNlJnbjNuTwpSUDVwT1o4OVFORGlxaU9PK1ZSeVNHZ1Z0bjBEYmFLVStldEhoRkxodnlDVE9OcmFRb3REVjh3Vi9sTi8rUU9BCjI5bDRUZHJqK2dVNjBJRkdzNlJWdzRSUzFEQlNxNWRkM0JqTUx5KzNxZDRjVS9pRVd5aWxkNTJMMDEzbUI5SVIKczVJWkRTOENTOGkxMmcyMEpVNUhxNmhGbSttaXRxOHBaTVpaWHlZa2JPRkxYeEhDVm5KVjNHUlBDQlpRQldwcQpNZ00ybmNHUHdIKyt6TW9TYjVmUVpuUkd3WlpkcEprU0dJVXM5ZDY3NlJPSkxta2VaSEpCZDlVa1ZnMmdSNUY3Cm1uVnhOa3JSdW1OSkxiSlA1NVRoTldrQnZiSW1Gb3VzTFFJREFRQUJvNElCQlRDQ0FRRXdEZ1lEVlIwUEFRSC8KQkFRREFnV2dNQk1HQTFVZEpRUU1NQW9HQ0NzR0FRVUZCd01CTUF3R0ExVWRFd0VCL3dRQ01BQXdIUVlEVlIwTwpCQllFRkx5Q0V5NVhZSU9HaEZYVkE5dHd0blpQTENTNU1COEdBMVVkSXdRWU1CYUFGTk1HL1RNS2l2WlBsK1pQClNKVUhxeWh0MTNLZU1GVUdBMVVkRVFST01FeUNIV1J1Y3kxa1pXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXUKYzNaamdpdGtibk10WkdWbVlYVnNkQzV2Y0dWdWMyaHBablF0Wkc1ekxuTjJZeTVqYkhWemRHVnlMbXh2WTJGcwpNRFVHQ3lzR0FRUUJrZ2dSWkFJQkJDWVRKRFJtWkRJeVl6azNMVGN5TXpjdE5HRXlOaTA0TjJWa0xXVTJOREExClkyTmxOamxrWWpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQU5vU0oxSWJ6UWl2V1pMS1FJejJEYlhMWUc0WisKak9CL01SRG1HZTkvcWFTK0o0TGs5elFrcDhDaURBMjRFRk4va2NGaUJ2eVZLZWhlNUxxRmt4VG5BdlpFY1djbwpWeDhhdFNRUlBrNm9aK0tvU1pXeWJucjVsMUtoNlpIWktLY0tDaW1tN01EeVBZNjFTczBTYnRKa0FOYndDbHRUCkFZTnpWd3h4bVV5ZkFaN0NqcTZvc1lvWW5Qb1c0UzV6dkJrMEZnOFN4Tm5jK0lLNmZsTk1nL0NjbGZKT1ZHUHIKMUR2NGtZT2xoTVdMaXhacjQwR0FpSFFYNjhPbmUyNDdSVGtaYXZFSFZ6dExLOVdzb0ZMM01na3BLS2NiWUVySgo3QVc0VkJDT2Z6Yjc1c1FoVWkvWTZ4WklaTVVJdzM0MDJDdWU0ZHlpbCtGS2VVUzN1dU5GYzZGZFRRPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlMWnJxM2hhOTlla3dEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTnpBMk9UazBNREFlCkZ3MHlOakEwTWpReU1qTXlNakJhRncweU9EQTJNakl5TWpNeU1qRmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056Y3dOams1TkRBd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFDNnUzTUFOd01FbU1KM3drcjRxS2dEVHJXOTRhK1p3YXJVCmxEL0tFZjF6ODVycU1PWkltanQrS2MrUkhxNXk1MFExNHRjNmhObm5OdXByeHNPbW84aFpDVWF1cEkvWGpyQXUKRWYvWklQTGNqUkxhZ3RJU25RdmQxZlV4ekhuc1U4STRvbmtNd0NCOXp0TGx5Z2Y1RmhCNCtWb2pka3RicndtOApvM0JEaUM1YnFqOUdTT0VwS2c2elVXS3NvTGpxTEo0UDJCUzlOK1d5eC9vc1ZLaTAyUktBZFdIeUxQUEE0eFRGClRKL3M2SVdaT0l1TDExZm15OXdrbzNTWEtvTnBGMHpoU21uVFBKakdZTW5jOE1sdkorb1kwS0M0TEJIS2JDSjgKcVpKNHRuVzJNRkhsekNYcFVrd3UyK0Y2N0dPM2hvd1BIU3d0MGtHbmJxMStrMTlxM3E5OUFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCVFRCdjB6CkNvcjJUNWZtVDBpVkI2c29iZGR5bmpBZkJnTlZIU01FR0RBV2dCVFRCdjB6Q29yMlQ1Zm1UMGlWQjZzb2JkZHkKbmpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVFCV1lXQ1FZUFJXWnhObGZ6OWlDNjdsd2pIY3M1TUZCUnlodgpISTJWOTN5M2JXaHdLSWFpQnU4d0dCYnR3TXF4RFdjN1RNeDgxem45VHA1M0h0d0wvVVJaMlZNanVVYU4vcURnClg3emVlVy9scVhkaFcybGIrSlhzT3Fpd3N0OUJwejl6WUkxM21ST0RhSkpoQzhIcFBrRzBPUWJCUWtwU3E4R1EKRkdiV1dCV29aVitVSlI0aGwxUGQ5eC9wd0J4ZWVTdER3T2o1QThQcUVvYU1taXNXWHk0c3lXSlBCSllTUDBYVQpIZjFwUTRpV3k1VngyWmhYNGVkYnlPNTNtL1BadkQyZHFDTzgwOXZBNkR5NlprdG5taG9KaUZJZFBiUzFDRWtaClNQYm1aQ3hMZGlSNHJLZ0UxU3I0YzVyNTRhQTNleWFIcGw3U1RJa21WTnpQN0g0NzVBPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T22:32:26Z" service.beta.openshift.io/expiry: "2028-04-23T22:32:26Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 4fd22c97-7237-4a26-87ed-e6405cce69db creationTimestamp: "2026-04-24T22:32:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"4fd22c97-7237-4a26-87ed-e6405cce69db"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T22:32:27Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 4fd22c97-7237-4a26-87ed-e6405cce69db resourceVersion: "7778" uid: 2c5f59da-3475-4b07-b970-d4f550c0c1d5 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-24T22:26:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fd68ac89-4d69-475d-b300-4d5c9939d9b3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T22:26:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T23:02:44Z" name: dns-dockercfg-jqx86 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: fd68ac89-4d69-475d-b300-4d5c9939d9b3 resourceVersion: "26029" uid: c87641e7-df84-4f69-9fa9-ee96225c477e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-24T22:26:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c6f4cf67-4caa-4cc6-902a-ac72a3d08234"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T22:26:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T23:02:44Z" name: node-resolver-dockercfg-tsrpb namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: c6f4cf67-4caa-4cc6-902a-ac72a3d08234 resourceVersion: "26035" uid: 0c4bb223-8ce5-4206-9653-0f83e8d5e9a7 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "33014"