--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-23T13:28:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"38066ab9-307a-4bb5-9898-919df8eb85e2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T13:28:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T14:04:36Z" name: builder-dockercfg-hht62 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 38066ab9-307a-4bb5-9898-919df8eb85e2 resourceVersion: "26098" uid: 39b31721-d6f4-46a8-8ea5-01caf7044505 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-23T13:28:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f02d5bb5-f9cf-49a5-8a28-8849f355fa7a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T13:28:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T14:04:31Z" name: default-dockercfg-rgf5h namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: f02d5bb5-f9cf-49a5-8a28-8849f355fa7a resourceVersion: "25928" uid: ca5b782e-7e8a-408a-b28c-a2ece0868d6d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-23T13:28:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0778fcab-751f-4004-917b-059de3333362"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T13:28:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T14:04:36Z" name: deployer-dockercfg-5kmx6 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 0778fcab-751f-4004-917b-059de3333362 resourceVersion: "26076" uid: f7b58942-cec4-414d-9d5d-3762f1b87e96 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ1ekNDQXMrZ0F3SUJBZ0lJWXZFQnFKMHJDSDB3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qazFNVEV6TXpBZQpGdzB5TmpBME1qTXhNek15TWpCYUZ3MHlPREEwTWpJeE16TXlNakZhTUNneEpqQWtCZ05WQkFNVEhXUnVjeTFrClpXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXVjM1pqTUlJQklqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FROEEKTUlJQkNnS0NBUUVBMVhKVlU5SnpqTnBNU3c2a2g3Nk5oVDdRV3JMWFdkNFJIVWhTTDR2QUFNbk05NFhIeXJ5dwo5aTMwRkV0TWEzcHJhT1hIc2NIMm03N0pYR215TkpNSUo4eHNvaUVUbm9HSjFmcG1nQ0xESFdWOEFjQTA1dFhXCk1wMXpwVWZVUjhGSDNyL2hkRzVFVXpvcnpQN0lGRkxvZjhTOWdIaWpKVXcwL3MzUUVUOG9iRW5WOXlya09XZVoKWmhUbGI5K2ZyMEZ1ei9zZXdrem1UaHRyVUtYYmozVEVoWTlpc2tMaGFzUHRwS0NIaHBicHkyS25MNkNkdldYZwpKc2U0K3QvY1pud3NoK0phYjZEQU5PNUZyYURLM3d6cmxHUXBndllqMzc3d3AwQUp0d3NkemRkUTRXNm1yK0g1CkE0bEdONWdXdENVVlJCbVUvRE1KOFZUMXZqSnpWYnVQd3dJREFRQUJvNElCQlRDQ0FRRXdEZ1lEVlIwUEFRSC8KQkFRREFnV2dNQk1HQTFVZEpRUU1NQW9HQ0NzR0FRVUZCd01CTUF3R0ExVWRFd0VCL3dRQ01BQXdIUVlEVlIwTwpCQllFRk82TG5VTlJxcG16THU0K3paSS95dHNkN1VMaE1COEdBMVVkSXdRWU1CYUFGSytpYStmejVXSm9WWTBrCitXS0dMMjYyYmlTd01GVUdBMVVkRVFST01FeUNIV1J1Y3kxa1pXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXUKYzNaamdpdGtibk10WkdWbVlYVnNkQzV2Y0dWdWMyaHBablF0Wkc1ekxuTjJZeTVqYkhWemRHVnlMbXh2WTJGcwpNRFVHQ3lzR0FRUUJrZ2dSWkFJQkJDWVRKR1kwWm1WalpqTTBMVEJrTXpjdE5HWTJZeTA1WlRFMkxUYzFaRFE0ClkySmxNalZqTlRBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQUtMTllpSWNnNVA5bDB4Wi9md0EwY25hZTFiSzgKVm9VT2ppMFN6bU5HNmJQMTUvVHN1dUZmWEthVDdLUTN3VUhtS0F4QzBnUTFmcGphQnBDbGM3ZHN4Zm4wUldYbQpqR3BNTFFaL0FQcFBHdVljeFNuWXZqZmVNU253a2F6RGRzM2p3dEZ2V0JPbzYzZjFqSW01bzhuZTJIdnA3L0MyCndMSkYrMWdjMzRpNStBNURIcXptR1NrbDRxeTlEN3hXTmUvd1NsQ1ExY0hkR3BtNlYyQzJ5Mm92bFpqREZpSG8KRC92Z3JkZEpvOFB6YmhEWHp0eDJ0c2JTdjlFTTFIWWhpY0VIcTNJbEh6THJwZ2VqSC9SUkIrTEIwMmh3TFlzMAo0ZGd6QmZrTXdtbUVRUjNpQlNCbnVDaXB6ZjJCalMvVUJrV2V1QUVRZmdrYTltaXZxdDRNdHJaTU5nPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUljczVpL1krNzdxQXdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmprMU1URXpNekFlCkZ3MHlOakEwTWpNeE16TXlNVEphRncweU9EQTJNakV4TXpNeU1UTmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTVOVEV4TXpNd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFEbDh6azNkNUtOVnNEMnNiVFVSd2JGd1Fvekl4SXVmLzU3ClVlQ3ZvbW15RVJsNlRHR2F0NjlkclgyUEZJd2JGamgreEdiRHdXWFZlcUkwTXRXb3RHS2wxNDEvdXJucE9yMzYKVXFxYjBnZjBRTXYvejljVmZhRzQ1N25zV0swL1RjaXUxa0h3MCt0dGl1QzdDTko2YXFGWUVBSWJCbDl6ZlJsTAp0RGJrUHR3NXdvWWFDZkhsZTBvSU9yTmdMY0VyR3orUi9OQloyQktJQWcxY1BkNFFITkdWVG1CM3ZyL2lpeUhHCmVtMVYvalZmYm5FdXd0V1E1SUZhNTA0ZmRDbXpFYS84VWp2ZjJreERJeTBwbmFsL3ZIUTdzMCs0Wm9PSDM2MlcKbmZMOExnQ3I4SUQ5c0c4ZHpkbmNvd2VDNnMrZ25vbWdEYlcwNUpVVUwwVHVOZno0VlBSUkFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCU3ZvbXZuCjgrVmlhRldOSlBsaWhpOXV0bTRrc0RBZkJnTlZIU01FR0RBV2dCU3ZvbXZuOCtWaWFGV05KUGxpaGk5dXRtNGsKc0RBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVdQMHRkNmthRkNNNGNiMHRPOHpUY2pyM2kraVk2YitiTU9WMAo5QXd0WG1wd3hURHdzUk13Rkg4WnliS0M2Rk1raFVuSmU1Q1NzTlZ5YTJJNWVIS0NnVUVjTVdjeEk4dmF2Mmt1CldGTGMwdERqWndaOXI3UFNCMXdyWlN6dlJIOEYyekR6TG56bFkzM1FZUk4xd1VjUEpVdGg2QU0vdGNoY2RVM28KWUdkRzJIbmlOVmtwRk80RFhBanNsaWx2Zm4yRjNDTTZHdjNnYlFVc1hrbWgxRkh2MFhjSW1qZE96N3VTT0REVgpxR1RBeU9jMk85K0tEK1BOTmFIcTJuWDJzaEtrYUJyWTBnamlMbS84TkR4M3RQRmdyeU1lbi9OTDBqc0ptalFKCktqUkFGcVR4TmVuVUU4WjJnV096dktOb05VQmVwWHc4TTZ4eW9QSGRVL2gvNmF0MHhnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-22T13:32:21Z" service.beta.openshift.io/expiry: "2028-04-22T13:32:21Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: f4fecf34-0d37-4f6c-9e16-75d48cbe25c5 creationTimestamp: "2026-04-23T13:32:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"f4fecf34-0d37-4f6c-9e16-75d48cbe25c5"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-23T13:32:22Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: f4fecf34-0d37-4f6c-9e16-75d48cbe25c5 resourceVersion: "6937" uid: 0a79fbb1-e484-4265-bce8-b2f1864236a9 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-23T13:28:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d3ec45c0-3533-47bd-a127-5c18387afeb4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T13:28:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T14:04:31Z" name: dns-dockercfg-4t8gv namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: d3ec45c0-3533-47bd-a127-5c18387afeb4 resourceVersion: "25937" uid: 8d52fb61-76bb-4f33-ac65-484d3a61fb23 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-23T13:28:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9e966818-9996-4422-9246-61b368d5702c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T13:28:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T14:04:31Z" name: node-resolver-dockercfg-kbm2f namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 9e966818-9996-4422-9246-61b368d5702c resourceVersion: "25936" uid: 3f0d7f92-7a5b-482d-a8cc-841dcacde69a type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "42633"