--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T22:10:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T22:10:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e287a8b6-6580-45a1-a150-0d652ccb8f65"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T22:10:27Z" name: builder-dockercfg-ch6q8 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: e287a8b6-6580-45a1-a150-0d652ccb8f65 resourceVersion: "4055" uid: 6d109d87-18a2-4a18-952a-c8c20dd75cd6 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T22:10:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T22:10:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fc303233-149f-4bba-987d-23e2ead74ad2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T22:10:22Z" name: default-dockercfg-v26mj namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: fc303233-149f-4bba-987d-23e2ead74ad2 resourceVersion: "3350" uid: 460bc1eb-ce01-465a-ac9f-c17a6c6462e6 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T22:10:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T22:10:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d4fa367f-dee6-4833-a68c-0639daa47ba5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T22:10:27Z" name: deployer-dockercfg-zhlv4 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: d4fa367f-dee6-4833-a68c-0639daa47ba5 resourceVersion: "4053" uid: 19390cb9-d483-4a01-b309-4cfdd07a674d type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ1ekNDQXMrZ0F3SUJBZ0lJUzJHdXBDRlJEbGt3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qTTNOemMyTURBZQpGdzB5TmpBME1UWXlNakUyTURSYUZ3MHlPREEwTVRVeU1qRTJNRFZhTUNneEpqQWtCZ05WQkFNVEhXUnVjeTFrClpXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXVjM1pqTUlJQklqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FROEEKTUlJQkNnS0NBUUVBMFp1Z0hVSHlZZFRmbDh5THFzQ0VyMlhxbjVsZ2JPSUNZL0ZwU2Jvbm10UnRoQUJYWGhHaApWSjhra29scVYxUVVEaFoyMi8rSW1xTlBqVmVFRVlrekpPOEFJK2JENlJqYitQSjA0d09raGp1dE9hZ1ZPd3ZJCktpeis0QUM2M1ZQWlpCWGwvMWoyRWdWbnpHSHEzMXcrREpUNnVONERzSERPYXVnWmhWbzVlNGxDSUx6ZzU4N3MKblRmbCtoT2J3MmlKdS8rRFVlcW45ZHh6MTNvOVlBNnp6Y2hNa3V1YjBGK0drdnhJaUVKTWVNRDhOM0srVzZRKwppMWU3SldBY0k5TmVpVEEyemUrYTcxTHRaN2FKRFRFaS91L1hJZkhwMW1rbWRsZnF6ZmdzN01zYVdDMThNbDR4CkxRNnYrUFI2ZUc4VFNlYjJHWnFzWUFsUmFtRmwwQXQ3endJREFRQUJvNElCQlRDQ0FRRXdEZ1lEVlIwUEFRSC8KQkFRREFnV2dNQk1HQTFVZEpRUU1NQW9HQ0NzR0FRVUZCd01CTUF3R0ExVWRFd0VCL3dRQ01BQXdIUVlEVlIwTwpCQllFRkcwdU1hcmhYakRQK3AyNVBFZkJwQnRaajd4Nk1COEdBMVVkSXdRWU1CYUFGR0VsaXk5dDBMazNkQ3AzCmxIYTBjN3lkVGdqaE1GVUdBMVVkRVFST01FeUNIV1J1Y3kxa1pXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXUKYzNaamdpdGtibk10WkdWbVlYVnNkQzV2Y0dWdWMyaHBablF0Wkc1ekxuTjJZeTVqYkhWemRHVnlMbXh2WTJGcwpNRFVHQ3lzR0FRUUJrZ2dSWkFJQkJDWVRKR1l6TldabFpERmpMV015T0dFdE5HVm1NQzA0TkRGbUxXUTFaRFE0Cll6YzJZMlU1WWpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWVScnY4VUJSOGdmbzRTK0Q5Vm0zanNUallQdUEKWXBhZzVnakhwMVJDemdWekx1a3ZFd2VKTmFBQWRWQWNRUzRmYUhDRytYclZsZWZudGRKQjlIU1ViRWd3OFRNYwpWK1IyMVlOc0NXYXRKL2hzZkpqNDI5bS83SWN5MlBIUTZYdDIvcXNzOXJ1QnN0c2RvaWxjZTF2ck85MnJXREZHCnVwczNyRmlVMnlKaHJhMm82WVgxQXYyUkwxOGZCSVpPK0o3K1R2WG5GcEFoMmJ1czJ3NWdqREc3UGV6NjF1OHIKekpqQWd4dExFMEsxakdIZmF3U1RPc2hVdnVxWVNubXh3RFBNNmg4eENBdEV5aWZvdjdyZncrQUdLclJ1RTI2YwpvVHhncllkdVBsN1dPSzJ5UjdBY05kbDhOV1c0K2VoVmhyb2p0TjNrNWFuclRYaVQ0UFkxLzljaWJ3PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlRWk84dW5uSjRDY3dEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpNM056YzJNREFlCkZ3MHlOakEwTVRZeU1qRTFOVGxhRncweU9EQTJNVFF5TWpFMk1EQmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WXpOemMzTmpBd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFDbFoxTWxUZVUzeDcwYTNwUjhYNlJpS1ZoWTlDOUdiaU1zCm1PSk1hM2s0c21YdUNqY0g4bWtuTmRGL0NwZFdUUnYwOXkrazk4d0ZMSktnbE91OUZKU1UzYkVNZWZReWliWG4KWk0wY29oaG5HR3I3ZWpXTlhRNE9XWjhEdVd0QU0xZ3gxUlFaQ2JtMGd2dThBVXhFY0Zpb0pobER5MC9PZ3Q2NAppNkhQOWxJaW81a0ZOZlRMRThmeTZRUzdlb0lzdytxMUhwdnJEMEt6dGVyb2JpMnJDRzgzVzdsRUtnUGI4M3lOCmI5YWF4U2FOVnlqTzF4NVRxcGdzREtaKzZGcTZqVmttTUFoODdzVlVxRWNHUTNIVGcyN2Y4UlJudUY0bFhHbHEKdGhtaGlaZ1oyTVBCUmxFcHlvWE56MzdCbHRZNmdLck5rRVN0YVF4aGNtc0crVzdXQ0tVVEFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUmhKWXN2CmJkQzVOM1FxZDVSMnRITzhuVTRJNFRBZkJnTlZIU01FR0RBV2dCUmhKWXN2YmRDNU4zUXFkNVIydEhPOG5VNEkKNFRBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWFUSlE5LzJ5L1liclhHZXlEb1hjeFdGWmRzWVducDc1V2RNaQpteDlzOHg4eWR4OG8wU25rVk9mc0hYVWkzZWxCQUNUS2xieXo4Q2pNV0lwd3ZURjZ4ZHBFS2hFOWhiMk1YTHhSCjg3N0FZZFFJMFZ0RHJjVGFBZldjVTYrYjlOUnJoSUIvUWo3YU9WeTZpK0twT2FiZm5GcHRqMWk2QytvSDFxbzAKR1JoOEYwbTlZM1ZWWDNxRmhEWStHZ014SWJ5ZVpqdm9CdXVCNEVzZ3J2Nm1zVFloSWJQOXRBNWFZTk5ES2ptMAphOGRhYyt5NHhFRTFWb1hVWmt1am9MYnBwTFpSKzNCR2RPR0czanFaMUxkNHQzR1AxaHNCbTBoQWhJQkVpaHFOCk12YlhvbFlhYVlVWkN6Mmx6a0tCcHdNOFVMQWtBMldnUW8vOU5QWS9uSS9FalM5dWVRPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T22:16:05Z" service.beta.openshift.io/expiry: "2028-04-15T22:16:05Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: f35fed1c-c28a-4ef0-841f-d5d48c76ce9b creationTimestamp: "2026-04-16T22:16:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"f35fed1c-c28a-4ef0-841f-d5d48c76ce9b"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T22:16:06Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: f35fed1c-c28a-4ef0-841f-d5d48c76ce9b resourceVersion: "7867" uid: 2381ee2f-f925-4bda-b901-3a2a7b3b7361 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-16T22:10:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T22:10:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d1440b00-b40d-4509-bb83-fdaeac0f10d2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T22:10:22Z" name: dns-dockercfg-fk2j6 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: d1440b00-b40d-4509-bb83-fdaeac0f10d2 resourceVersion: "3351" uid: 34114aa8-fd8e-4113-b8dc-d2e983a351f3 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-16T22:10:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T22:10:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7fae57e3-6a10-4259-aead-c1c49461b084"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T22:10:22Z" name: node-resolver-dockercfg-4bxft namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 7fae57e3-6a10-4259-aead-c1c49461b084 resourceVersion: "3354" uid: 8ed8d74a-d7ac-4db5-b1e3-6d55eeb62b08 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21253"