--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T18:33:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"84e5fe32-cf31-4f64-a089-f144aa257361"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:33:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:09:21Z" name: builder-dockercfg-ckjxp namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 84e5fe32-cf31-4f64-a089-f144aa257361 resourceVersion: "38944" uid: dfb5e468-8afc-47e5-a24c-7a4a0d1469b8 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T18:33:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4e8954d2-be26-437d-b614-26cc0d885077"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:33:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:09:16Z" name: default-dockercfg-ww2vx namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 4e8954d2-be26-437d-b614-26cc0d885077 resourceVersion: "38754" uid: 81c1dfd7-943f-4745-9934-9764df7dafe1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T18:33:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"58d7a8a2-9f86-476b-a5d1-96710fa23c63"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:33:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:09:21Z" name: deployer-dockercfg-26v68 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 58d7a8a2-9f86-476b-a5d1-96710fa23c63 resourceVersion: "38948" uid: 78be0d82-a070-4497-a171-b26a80e5edea type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ1ekNDQXMrZ0F3SUJBZ0lJWHcxUzJqN096MFV3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qZzRNekV6TkRBZQpGdzB5TmpBME1qSXhPRE01TURCYUZ3MHlPREEwTWpFeE9ETTVNREZhTUNneEpqQWtCZ05WQkFNVEhXUnVjeTFrClpXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXVjM1pqTUlJQklqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FROEEKTUlJQkNnS0NBUUVBcHBuVkdBUHBQSi9QTDNhSWhvZGVrclN0dEl4MHpPMFlUdzlDVzlrRUNFS0pxd3lqTy9tdwo2dDBLTWc0cEhFV1JORHI0ODEvaVVxTkdWdWRkdzljQjZuekkxemFXNW5oQXE2WFEwUHRqQTlvSGVOMjA5Y3FmClc1dW9WYnl6czFITEJodVpiL1ZIU0dOaE5zVEMvQlptYThxeCtUN01oU1NOVmdzVHdGYi90U2xWVHczM1loTncKV3VGN3BnYmZ2TWdLMWhnMDBjYUwzZG9qMmxDa0hOdW51Y25EdEVQQS9zUzlwU3NZanRJc293cS8rWjIvb09yQQpMN0RTaW1MUTlpRmRBK2dmbjlTd3NWUmN1Yy9DbmxTWGJTd1RZcXkzY1QzT1ZHK2VRRGppb0ZoVXU0MUpVSDVhClFVYjVlYmZzL2RUK2JocXVUUzhIVUlrYS9zZHU3TGtsSlFJREFRQUJvNElCQlRDQ0FRRXdEZ1lEVlIwUEFRSC8KQkFRREFnV2dNQk1HQTFVZEpRUU1NQW9HQ0NzR0FRVUZCd01CTUF3R0ExVWRFd0VCL3dRQ01BQXdIUVlEVlIwTwpCQllFRkdjazROSE9BMjB3L1ZFaE5ZV0R5a250Q3IvaE1COEdBMVVkSXdRWU1CYUFGTzRYcHRtV2pjSExLajVXCm9mZkM1ekhCTjBGbU1GVUdBMVVkRVFST01FeUNIV1J1Y3kxa1pXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXUKYzNaamdpdGtibk10WkdWbVlYVnNkQzV2Y0dWdWMyaHBablF0Wkc1ekxuTjJZeTVqYkhWemRHVnlMbXh2WTJGcwpNRFVHQ3lzR0FRUUJrZ2dSWkFJQkJDWVRKR1EwTm1ZNE1EZGhMV0l3WVRRdE5EWmlOQzA1TkRrM0xXUXdOR0psCk16SXlZemhtTXpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQXI4amlqUldCa0w1QnNCK3NPWEdJTmIrSmRad3QKUUczc0lWWDZpRk9TaXZJZ0ZqdG1ZbU9UOURMZ1diUDJ4cE41UUZLbW1oSHNZbDRicURmTk1aK0txSVpCczhHNApZWHdkOXRyQXFQR1YwOHpVTlQ2NjZiNHEzSWF2SlB2WDVBNXZLR2QzUGdOWXB4bktnbzhuT1FKcksrc0k4Ymc4CkZScHRxVTg0cDMzaW0xbWM2YVpQTVVqQitmZGt4emEzUUJXbjcxaElWNnJEQVlnSURsQVlvRGJTWk93RmpaY20KcFJNWEZ4cE1PRHVnYjEwYkpqNlhtb0o0bm9oYnNON2U4SmRBeUxQcUt4Zlo4RHIxU0lZOXVOWnJwUnRpa253TgpUaHZXZTh3V2tKQUxSdERRc3I2K0NmSmMvYkFlbU8yM3haSDMzdGtvMUl0cE5Sd3lrUG5XL3VWTnlBPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlLcFRscWdVTzBpZ3dEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpnNE16RXpOREFlCkZ3MHlOakEwTWpJeE9ETTROVE5hRncweU9EQTJNakF4T0RNNE5UUmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTRPRE14TXpRd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFESis2QkNFeTI4dmdoK0pUeUVHSzByMUxNM0NXQVg4NWtZCnI2NVhhT2FYcTVIKy91cGF4dS9xWjJoVzNPbms4ZnJUbGd0UE52MkxIemNiMVU5M2VBNmt0a0pqeUhwdU1QL3YKL0lZVSsrT3c3VGlPUDB0cmVyUjdXejN2NVFxcU9qMXBFTXNaMGRRZVdSdmpaZHZEUmNZUHlrR1FRWVJ0ZWpTcwp6eDhOVi94ZmQydENsSitpQVhndGt4YlZSTW9IaUY0TlBKTFVsMjVWYXY5Ri9uNmVuSGM4Z1RxVkp6eURrUjNvCkJXNjA3WUJUQjdPZzVsZEtIcUZxZ0lSc2ZTWUJwRy9wMU1LVHJTMzQ4TWpFZlR4NjBiYXdXUStGN3VmMmRnTmgKLzlFcnhOM05ySGhXeVNoQnIweHUrMWREYUJ0SlptVkJaVzVnRmR2enBBU2FlTnhpaFlRMUFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCVHVGNmJaCmxvM0J5eW8rVnFIM3d1Y3h3VGRCWmpBZkJnTlZIU01FR0RBV2dCVHVGNmJabG8zQnl5bytWcUgzd3VjeHdUZEIKWmpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQU9iMzhDNE1mMWZLZk9TTk9CU25jcHFmUUZoZXVaWmdrb0dRegpsUStWLzNUckVQQ01OTzlBbTZNWGhYOXh2amNyclJhK0xQQy9wYzFxYXBGSlBSM1dzNnNlb0dCbTIwVW90TVFjCmFJZU04QllxanhUUGVudkVHS2tDSXovalVwSlhMWVNJbTl2SitGRzFSbWt3WW9VREtqRnkrOHRkVW9YTXpiU28KeFB6MmVpSk1DREp0VXNrRUFoUktFREE3ckU0VjY1MWNVVS9lV2hxSjhPdXVIWWdQTlk2S01JVXhiSzI1MXc2agpLTXZpd1RxQnZoNFUyRlFMY0d3NHU3QnRzV2N0TXBkdVNCYXVlQlc2VTh3T0hxYVRONm54Y2JKT3ZtbUtrOW9yCkU4elp4U2V0M1pONjgwbFNIWXRIYUEwSDNvVnJRYzNTcGdkVTY1Q2lXRmJWSGdPcHBRPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T18:39:01Z" service.beta.openshift.io/expiry: "2028-04-21T18:39:01Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: d46f807a-b0a4-46b4-9497-d04be322c8f3 creationTimestamp: "2026-04-22T18:39:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"d46f807a-b0a4-46b4-9497-d04be322c8f3"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T18:39:02Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: d46f807a-b0a4-46b4-9497-d04be322c8f3 resourceVersion: "7361" uid: e6dd90a7-8c10-45cc-87f9-ad288875dcb9 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-22T18:33:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"14727f9a-80a9-4fad-8db4-646ba44f16f7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:33:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:09:16Z" name: dns-dockercfg-cfw2h namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 14727f9a-80a9-4fad-8db4-646ba44f16f7 resourceVersion: "38763" uid: abd3275a-39bb-43d1-93f0-3cb31b9aab09 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-22T18:33:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a9dad50b-6b19-49af-8596-5103805794fa"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:33:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:09:16Z" name: node-resolver-dockercfg-pchrd namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: a9dad50b-6b19-49af-8596-5103805794fa resourceVersion: "38762" uid: c694071f-afea-4d56-833f-ff9cdbd435f6 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "39415"