--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T19:20:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8f3d84bb-f1c3-4c1e-8821-cd4b8ed51d49"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:20:12Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:56:12Z" name: builder-dockercfg-sqw4w namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 8f3d84bb-f1c3-4c1e-8821-cd4b8ed51d49 resourceVersion: "24441" uid: 3808dc4b-6705-491e-a864-bb705888161f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T19:20:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"76dcf95f-1078-43dd-8a5f-6ec15c6d1956"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:20:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:56:07Z" name: default-dockercfg-b7llf namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 76dcf95f-1078-43dd-8a5f-6ec15c6d1956 resourceVersion: "24286" uid: ec4fe26e-3fea-4608-924e-098e47c61574 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T19:20:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3e9e5510-1300-43dd-af0b-10a826b66fe5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:20:12Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:56:12Z" name: deployer-dockercfg-24xr9 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 3e9e5510-1300-43dd-af0b-10a826b66fe5 resourceVersion: "24439" uid: 2764f144-a7cb-4778-af98-d1268b4547aa type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ1ekNDQXMrZ0F3SUJBZ0lJZEtwSzE0SWFIVkl3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qZzROVGswTVRBZQpGdzB5TmpBME1qSXhPVEkxTkRkYUZ3MHlPREEwTWpFeE9USTFORGhhTUNneEpqQWtCZ05WQkFNVEhXUnVjeTFrClpXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXVjM1pqTUlJQklqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FROEEKTUlJQkNnS0NBUUVBNWo3TE9MbG5HVmhzWmlYbUM3VWRLclRwUHZVbFFIMmtGMnhVRXU0NkdUTVpSY3g4dkNLcgpvcHI0RFdLdTRCUXJqZ29DVjlsT1VxRVRYSklhNmxUVWVLS1FXbjBQV2pVUEZ3TGpldzZ3S01NWVk1SEQ5d2t6CnBtMHhUSlJrL0VjbzRGS1BoVk55Qk1Pc0dhdE5WZVQwMDJqaHNzNEpwYy8yTG1tc20xOTU1VHpvQnRDUU1NTHQKaExLZFk3N0VMOExIZjdiRlY5TXAwNFB2ei94eWNUdkJ3MzJRVStCUkVZL0ZuMkZsOTVhM2xyWEp2dE1UeStXRAp2U1pjdEg2YS9ESUtmNVRJb1o1WWppaGtvcHZTdWI0cjU3TWM3REM4OE5ZU1JHSklwYmxySXV3cTZUTUJ2MVYwCkx5dWxkeTVYZitTaVh4U0paWFZHK1d0WGlZUUJ2WDNSeVFJREFRQUJvNElCQlRDQ0FRRXdEZ1lEVlIwUEFRSC8KQkFRREFnV2dNQk1HQTFVZEpRUU1NQW9HQ0NzR0FRVUZCd01CTUF3R0ExVWRFd0VCL3dRQ01BQXdIUVlEVlIwTwpCQllFRlBEWm5BMWt3MGtrOWdoZktvdGVYY0hFeWRLUk1COEdBMVVkSXdRWU1CYUFGRzVNYjFkVWJhcmZNcEFmClRFelZ6UlcrRXJNSU1GVUdBMVVkRVFST01FeUNIV1J1Y3kxa1pXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXUKYzNaamdpdGtibk10WkdWbVlYVnNkQzV2Y0dWdWMyaHBablF0Wkc1ekxuTjJZeTVqYkhWemRHVnlMbXh2WTJGcwpNRFVHQ3lzR0FRUUJrZ2dSWkFJQkJDWVRKR00wTVRrMk1qWmtMVEl5TkRNdE5HVTRZaTFoT0dJekxUZzBNbUUyCk5UZGlOVEF3WmpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWtNRndvWVBQSTRuYmJDYzIraTduaWZvbWFaTEsKdnRsWlFmQ2NUVGRPUEpCd2NhQVNvYkpETndQWEt0dUE4NmxJY1ZlcEVzWUxLN1I5TE1YS1JCZmFHQ1lZS09FWQpRWDZIRkdSLzRSa0hwOSt4aW9pT0ZMazcwcW01N1dCaE01ZVI0QkUxMGNUL2JWakl4eWJrMGJuV2dPd2IvYTJQCnZJdFF4YTdFb3JCN2FpWXJUTzlaNjJ4K1ppaWhzOGFjN0doUWhXMGZtd21sTnBQTXg0d0M1MmpQcmpVQnBTa3oKWG5ZNVZ5Um1HNjNYd3M1UU15VFM4bjMvUnZRMzJDVVRqUTkzNUp4NWM0dSs4NlRaNE5PSUxPajV1NEJGRGYrcApYVU9LQVN5NElwN1JIeURyanNDS0hqWmFvWTE3YjlnaW1pMlZTejNTRU1OSVF1MHZuN0Z0RzhMbjZBPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlXckI2OGdrQVluc3dEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpnNE5UazBNVEFlCkZ3MHlOakEwTWpJeE9USTFOREZhRncweU9EQTJNakF4T1RJMU5ESmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTRPRFU1TkRFd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFEbWJodFZIQXpTeDJ6ZCt5aTBYQjduY2hsZFM4QjNGTzUwCitXb2p5eWtIK0JyU2hIYXFISjVOdlRlNVEwRVR4OG11NDNTQmFIb2RONjl6ODBudG1qK1RIdDJrQjdnc0ordmcKVlhTYUJWbm1iNGw1a2tJVFlNSG9rZ0ZJNFpJQjJiT1V0THh4c3o0YzBkWmd5RTFjKzI5ZjRsTlFBRnpYTERzQgpnT0ErWkt2clZCRzM1bkdoYVdXK2srTDNFQS9uMGNjZ0xhOFV3dGNKSUg3ZmgwdElXK0xZbHUvdXkzajNJdHZKCkxXRk5GbGJQdjF1NUFhOHlsWGh5L3V2R2dNYWU4ekZEWE8yT1EvVWRLYTFKSitjSFpLMis5bkpjd3YydmdFbGoKRmlqUnpJTS85b2RWdVFkZHdPbjM5ZVljTFp0SE1SUGdleThsOTljckRSSFRiZlJsQXQ4WkFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUnVURzlYClZHMnEzektRSDB4TTFjMFZ2aEt6Q0RBZkJnTlZIU01FR0RBV2dCUnVURzlYVkcycTN6S1FIMHhNMWMwVnZoS3oKQ0RBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWRMZEhpb3hvUUJLYVcyNEhtYXdsRE96ampQcUhVZTYyUTFCYQovTzN1dFVwU2NMeDN2ZHhDcTNscHk3N2VCU2VDRU15M2Y3OU9CNy9uWnFJWUJhWGxsVDhETGg3MDhkQVYzdjFWCmV0dVZXYW04V3c5VTMrc1ZINkt0Z25DSzNZK1FhOGU5S0pCbFg1d1dBS04xVUVBRWhLWmxtRzJmV2VtWEdGeTEKZUo5UEsyNGR6YTJYbFVwVURsS2tHNW5HOHFZNEdUYXB4cXc5K05zMEtNL0lCUHJWcWhRNFgvT2FNY3FOQllDeQpRRWozSUE5UjUyMnFYQ092dnhlWVJXNW84dXF3VkJPMWM4SEN3YU4ra3Jxc1MxZ3RubmFIK01tbW80b1BNVWpRCklEekZlZ0t6YmR1UGJpVVdrR2lFTXFYL0wxSVUwRUd4SUVBWjM0TUNidjM0TzFlWXRBPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T19:25:48Z" service.beta.openshift.io/expiry: "2028-04-21T19:25:48Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: c419626d-2243-4e8b-a8b3-842a657b500f creationTimestamp: "2026-04-22T19:25:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"c419626d-2243-4e8b-a8b3-842a657b500f"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T19:25:49Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: c419626d-2243-4e8b-a8b3-842a657b500f resourceVersion: "7434" uid: ebdcce3c-23e9-4c58-8b14-3221984719b0 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-22T19:20:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f2938b19-cc2e-4adf-8896-2bcf0b98f1ec"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:20:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:56:07Z" name: dns-dockercfg-6f5sr namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: f2938b19-cc2e-4adf-8896-2bcf0b98f1ec resourceVersion: "24250" uid: 73d40f5e-4bf9-4cf8-a121-160dfa69c611 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-22T19:20:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f3cb7935-86d8-4797-a97c-28d8a9493b29"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:20:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:56:07Z" name: node-resolver-dockercfg-xfjtr namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: f3cb7935-86d8-4797-a97c-28d8a9493b29 resourceVersion: "24280" uid: 78cec924-b20e-46fc-9f75-8fac658e4567 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "39700"