--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T19:50:26Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"af5072f9-5fcb-4469-9a7c-2e43476f95e7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:50:26Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:26:26Z" name: builder-dockercfg-99x96 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: af5072f9-5fcb-4469-9a7c-2e43476f95e7 resourceVersion: "38995" uid: 40dad01c-fffb-4f99-be45-79a85a2244b5 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T19:50:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"18a1dff5-609f-4f6e-88b2-b0ada3e5e359"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:50:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:26:22Z" name: default-dockercfg-b7d9j namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 18a1dff5-609f-4f6e-88b2-b0ada3e5e359 resourceVersion: "38854" uid: 4a59e75b-f0fa-4d72-8f90-0b76f55f4e41 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T19:50:26Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2b9785ea-0510-4c07-9bb6-fec6b1f92f84"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:50:26Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:26:27Z" name: deployer-dockercfg-bwfw6 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 2b9785ea-0510-4c07-9bb6-fec6b1f92f84 resourceVersion: "39029" uid: 38f27310-94ac-41a0-8663-035e7b754ac4 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ1ekNDQXMrZ0F3SUJBZ0lJTXJUWXZXNnZIUEV3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qTTJPVEk0TnpBZQpGdzB5TmpBME1UWXhPVFUwTlRKYUZ3MHlPREEwTVRVeE9UVTBOVE5hTUNneEpqQWtCZ05WQkFNVEhXUnVjeTFrClpXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXVjM1pqTUlJQklqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FROEEKTUlJQkNnS0NBUUVBbXU1UHZYcEE1K1Jyc2lZMEZJODlXUmVWRjRZV2RlVTdkZVRPRVYyY1lRU3Z2RmMvdnd6QwpxY3hzbXg5VjN3bHgxTHI4TU8rSE8xbjc1VmsyZlBxYi9aY1VYVHdHcmoxU2VNK2QydXo0SmJLeGZPK1BoZ0swCmNzaW42bm9LTkkxRE5FR3BFTkxpOWE3V01qekR4QjJ2U3VZRDJRZG5tSmpIUW9Sei9kalZJWFZVN0t4bWlhSXMKVFpQR090WUJDQTJhYWprd2FCOFg2UWNqcHl5cWVoTERKcTNxQ3BiU1ZGT0FBZFpHMzEwSk5NWStaQzRabVNLdQp2WkxLdEpWQkZFcGtPcldPakE4V2lJd3lEUmo3ZXNHU0N6MlRGMWM4eVI0bTZJYnU5OS83UDRySVVQMDRGeFVOClY3MnU4a25sRzhmVVlaZXgwajJORnhnSC9xVDVqT2VXZ3dJREFRQUJvNElCQlRDQ0FRRXdEZ1lEVlIwUEFRSC8KQkFRREFnV2dNQk1HQTFVZEpRUU1NQW9HQ0NzR0FRVUZCd01CTUF3R0ExVWRFd0VCL3dRQ01BQXdIUVlEVlIwTwpCQllFRkEyOTVDOXRlNmg0WnBNMmhZbjFmd2VGYjJTV01COEdBMVVkSXdRWU1CYUFGSUNJYW00WVlmOEVpRjd2CnFmWUZwQlFHbGhxK01GVUdBMVVkRVFST01FeUNIV1J1Y3kxa1pXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXUKYzNaamdpdGtibk10WkdWbVlYVnNkQzV2Y0dWdWMyaHBablF0Wkc1ekxuTjJZeTVqYkhWemRHVnlMbXh2WTJGcwpNRFVHQ3lzR0FRUUJrZ2dSWkFJQkJDWVRKRGRoWW1ZMk5qVmxMV0U1TjJFdE5HTTNaUzA1TW1SbExXSm1OR0ZpCk5qbGtNVFV3WmpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQUJXdWZ0N3gxc0RPQ3ZWWXliM0VCWUNpckUxU0YKWW5NWG1kcVI2MTYwUXM1SHRNS0RycDBCd0lna21xS056TDRHWFpMMVN0QVFTNXZmZlpPZVlLKzJTMkFWZXNJVQpvQVI1RUovNjNvYUs1NjJGY216RzVGbFBvS2c5QU9NandVUE56dm1PTDV1WGx6SlRLWkxZOExvN1lob3YxdUlVCm12WGZtVTYzU1dRVXdpZ0pERmRtR1Z5K0F6cG95azZ2OHNIMExaS2ZWa090MXNVRWdFTEgrcG9xSXp1a3hEV28KaUV0aEU3bGZkRlArR1o2OXN2T0crTGNaMktZb1RQcHYxd0tYYkdObkNCUnN6NTVPTEVGOExwTllSdW9EYXpwUgorOU90VUxqcnpyZEl6YnZlQXF2ZjZ4V3VZNzkxdjRXbStQR2MyTDI2K1ViT1owbTliU2JCSVVkN2hBPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlieWczUDZMK1RGNHdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpNMk9USTROekFlCkZ3MHlOakEwTVRZeE9UVTBORFphRncweU9EQTJNVFF4T1RVME5EZGFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WXpOamt5T0Rjd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFDcU9sM3FnMFlZTWMvM1pXOFV4UFFIa2FlVjZvRGNIei9YCnFJdXJWVUFxbm5STmE4bFVaM3RBSVdCcUNRbmRtV3FnZFAwMllWakM2K2JFTGFibmx6eDVnNGdPMW5mSG9qdXcKVWFzUXZ6cFlGZktXbTkyYW9yY2x0TENoREdXNEh6dDNPdk9aV1lzMXBmSkIvMS9UUjNyTmxLazl4eDZoaDlNVQoyY2JxaEdJVXY5MExYN2tXeE9rcTJRcGNVK2RwSjdnUjQ2M2hsWHJ5R2tBYjFmVDF4Q3dOSU50d3hmamdma25NCkhOeXBtQzNrMHFNb1ZoMVRGNEc1R2dYMjNtWEZOR1owTHdtVDUvUnpHbFdhQk5IeGVGbnBmbDRMQm5TVVNIRUIKUFBMeFI5WmQzaU1JSml3ZUZrdC8rZXVEYWdNTmU1M0V0RlZEaXJic1JFT25MYS9EM1ZrMUFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCU0FpR3B1CkdHSC9CSWhlNzZuMkJhUVVCcFlhdmpBZkJnTlZIU01FR0RBV2dCU0FpR3B1R0dIL0JJaGU3Nm4yQmFRVUJwWWEKdmpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQUpvbVJHQmN4M2ZWL05MTWRrZXUwT1NUazA4WWNaMUxqN1daTApXMG4xQW1GcGJXNXhISG11NUVWbjlpZjhNK2hieFdhN3RDcTlHNjh4SGFqYlA5V1pnK0xwN1ZrQjVTSDFCOFVVCmpiYzJzRk9OWjRuL0FvZHhkeWF4L1lXWmQ1eXdwK1NCb2g1QmhpbjFJeXJ1Rlg5aGhJT2hXUnVLYnBKcGlXeVIKSkNLQXlRSWtJTWY4Ukxwbnd1d2xCdW11UmpuMGpwMVdnMVR1V0hjRjdSREhTR1gxcVkzNE1scmlCcGkwSVZpbQpaQzBPNU5OYjhWNUN5RVV0V2wrWDlNdkRZUnQ1bEV2YlZEL3EyVmpJdko5dVVyb3VkR2hHN1I4ZVBRQ203SVBhCmZRT2VKMitWVHpYUTF5ZDVxc1VFUGx1ME1tNGdSNnhyRmpGUkkzclIzKytTZ3JVSjZnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T19:54:53Z" service.beta.openshift.io/expiry: "2028-04-15T19:54:53Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 7abf665e-a97a-4c7e-92de-bf4ab69d150f creationTimestamp: "2026-04-16T19:54:54Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"7abf665e-a97a-4c7e-92de-bf4ab69d150f"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T19:54:54Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 7abf665e-a97a-4c7e-92de-bf4ab69d150f resourceVersion: "7260" uid: e4937bf9-848c-44b7-9ab4-719b4b4d3d7e type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-16T19:50:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c31dc127-9862-4130-8f9c-a8565f6d209e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:50:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:26:22Z" name: dns-dockercfg-lx244 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: c31dc127-9862-4130-8f9c-a8565f6d209e resourceVersion: "38851" uid: 9cf86d14-79f6-4cba-832c-f8d7682d46db type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-16T19:50:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6e9cc334-931e-4599-9f9b-8aa2eb890815"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:50:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:26:22Z" name: node-resolver-dockercfg-j2vdp namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 6e9cc334-931e-4599-9f9b-8aa2eb890815 resourceVersion: "38850" uid: c8b682e9-4e69-4546-8066-2153ae0679dd type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "39811"